Back to College/School Cybersecurity

Millions of students across the country will be back to primary, secondary and third level classes over the next few weeks. The new school year is an exciting time for students and for staff.

It’s also an exciting time for hackers, identity thieves, and other unscrupulous types who take advantage of people during busy times of the year.


Students learning about cybersecurity

Watch out for typical beginning-of-the-year scams:

  • Email supposedly containing “important information about your school account,” or a “problem with your registration”;

School Security
  • Scams specifically designed to cheat students out of money, such as scholarship scams, textbook rental or book-buying scams, housing scams, tutoring scams, and work-from-home scams;

  • “Tech support” scams where you get a call supposedly from “your Colleges IT Service Desk” or even “Microsoft” or“Apple” telling you there’s a problem with your computer;

  • Revenue impersonators demanding that students or their parents wire money immediately to pay a fake "student tax";

  • Messages asking for your login information, no matter how legitimate they may look. No one other than you needs to know your passwords.

  • Fake friend requests;

  • Fake Dropbox or Google Doc notices;

And the list goes on…

Cybersecurity in Schools

Keep What’s Private Private. The start of the school year is also a great time to think about your online presence. What you post online can live forever, and you can’t fully control who sees it. To better own your online presence:

  • Choose your privacy and security settings; don’t use defaults.

  • If you wouldn’t want your employer, landlord, professors, or grandma to see it, don’t post it.

  • Don’t share info or pic about others that you wouldn’t want shared about you.


Eight Cybersecurity Good Habits: Here are simple habits that can help protect your information, privacy, pocketbook, family, friends, and work. 1. Always think twice before clicking on links or opening attachments. 2. Verify requests for private information (yours or anyone’s), even if the request seems to come from someone you know. Con artists know how to fake their identity. This means calling or visiting your friend or the person and verifying that its them sending the message. 3. Protect your passwords. Make them long and strong, never reveal them to anyone, and use multi-factor authentication (Multi Factor Authentication, also called two factor or 2-step authentication) wherever possible. 4. Protect your stuff! Lock it up or take it with you before you leave. And password protect all of your devices.

5. Keep a clean machine! Keep your devices, apps, browsers, and anti-virus/anti-malware software patched and up to date.

6. Back up critical files. Store backups in a physically separate location from the originals, and test that you can restore them periodically.

7. Delete sensitive information when you are done with it.

8. If it’s suspicious, report it!


5 views

Contact Us

"Drop us a note and one of our team will reach out"

© 2020 by TUSA IT

 Address. Unit 17 Castlemartin Green,  Bettystown,  Co Meath 

Tel: +353 1 566 6673