{"id":14902,"date":"2022-10-20T12:45:05","date_gmt":"2022-10-20T11:45:05","guid":{"rendered":"https:\/\/exa.net.uk\/?p=14902"},"modified":"2024-05-02T17:09:42","modified_gmt":"2024-05-02T16:09:42","slug":"school-online-security","status":"publish","type":"post","link":"https:\/\/edit.exa.net.uk\/knowledge-hub\/security\/school-online-security\/","title":{"rendered":"How to improve your school’s online security"},"content":{"rendered":"\t\t
It may come as a surprise that the education sector is a target for cybercriminals, however when you think about it there is a vast amount of sensitive data stored on school systems which presents an opportunity for those looking to exploit weaknesses.\u00a0<\/span><\/p> Files held by schools can range from names and addresses, attendance records and grades as well as confidential information regarding vulnerable students. As such, this data is extremely valuable and, if obtained by unauthorised sources, can have serious consequences to operations causing a significant amount of down time and labour intensive disaster recovery to re-enable services. Not to forget the safeguarding implications involved in a data breach, such as jeopardising the safety of students, parents and staff as well as causing distress or embarrassment if the information is leaked.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t So now you know cyber attacks are prevalent but how do you mitigate them? Here are some tips that will help you defend your network. From reviewing your cyber security policy to managing vulnerabilities and implementing a variety of security solutions, there are many ways you can improve your school\u2019s online security.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Reviewing your cyber security policy is a good place to start. Consider whether current practices are compliant with the policy and if procedures are being followed. Also take the time to investigate the latest guidance and update the policy accordingly.\u00a0<\/span><\/p> Make sure you implement the policy correctly to guarantee its effectiveness. Run workshops and training to get staff buy in, explain adoption of the policy isn\u2019t optional and as such must be adhered to.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Viruses are often spread using mislabeled files – hidden inside downloads or attached to spam emails. You should make sure to verify the sender of the email and the trustworthiness of the attachments or downloads before clicking on anything included in the email.<\/span><\/p> Spam emails can appear to be from legitimate sources, however there are warning signs to look out for:<\/span><\/p> When creating a new account a website will usually give you guidelines on how best to create a secure password, however this may not make the password genuinely secure.<\/span><\/p> Here\u2019s how to make sure your passwords are as secure as possible:<\/span><\/p> For more in depth information on best practice when it comes to creating passwords check out our blog here: World Password Day 2024<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t It is important to make sure that your security software is up to date, this will help protect you from attacks and viruses. The two main types of security you should invest in are firewalls and content filtering.<\/span><\/p> Firewalls are a major part of a security plan, as they prevent unauthorised access to your devices. They act as a barrier between your network and the internet, analysing incoming and outgoing traffic and blocking anything deemed potentially harmful. This is the first line of defence for your system and as such is a key course of action.\u00a0<\/span><\/p> Content filtering services block inappropriate websites which can contain malicious files that can harm your system. This can also prevent certain file types from being downloaded by users, cutting out a major vulnerability. Content filtering also offers reporting functionality, so you will know when attempts to access unauthorised or unsavoury material are made allowing you to take appropriate action.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Suggested<\/span> Next Read <\/i><\/span><\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tHow to protect your school from cyber attacks<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Cyber security policy<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Spam emails<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Secure passwords<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Security software<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Your legal responsibilities<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n \t