Cybersecurity

Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Email and SMS Protection

  • Do not click on any link in an email or SMS (text message) if the sender is unknown to you 
  • Report a suspicious email to the IT Manager
  • Examine the email address and URLs in all correspondence; scammers often mimic a legitimate site or email address by using a slight variation in spelling
  • If an unsolicited email, text message, or phone call asks you to update or verify your account information, do not follow the link or call the phone number provided in the message itself; instead, go to the company’s official website, log into your account, and verify whether something does in fact need your attention
  • Do not open any attachments unless you are expecting the file, document, or invoice and have verified the sender’s email address
  • Scrutinize all electronic requests for a payment or transfer of funds and do not perform any UACS related financial transaction without getting proper approval
  • Be extra suspicious of any message that urges immediate action

Phone calls

  • The Internal Revenue Service (IRS) and Social Security Administration (SSA) will not contact you by phone
  • If you receive a call from anyone claiming to be from the IRS, hang up the phone. You can call the IRS back using the official number posted on their website
  • If you receive a call from anyone claiming to be from the SSA, hang up the phone. You can call the SSA back using the official number posted on their website
  • If someone calls asking you to buy gift cards, just hang up

Video Conferencing Systems

  • User passwords should be utilized
  • Do not share meeting links on social media
  • Use the waiting room feature to be sure of the identity of attendees
  • If you are not the organizer, you can verify if the meeting is being recorded
  • If you are being recorded, you can request the organizer to stop the recording

Protecting UA Clinton School Data

  • Do not download UA Clinton School data to your personal devices
  • Keep UA Clinton School data on campus systems
  • Instead of saving passwords to document files or on paper, use tools such as Password Keeper or KeePass to manage passwords
  • Avoiding the use of unsecured or untrusted wireless or wired networks
  • Notify LRPD and UACS IT at itdept@clintonschool.uasys.edu immediately if any device storing sensitive information has been lost or stolen
  • Using encryption to safeguard all storage media, for example, hard drives, USB flash drives, etc.

Anti-Virus Software

  • Always use and keep enabled the endpoint security solution UACS provided
  • Perform full disc scans on a regular basis

More information regarding best practices for staying safe online is available at the COVID-19 Security Resource Library located on the National Cybersecurity Alliance (NCSA) website.