Skip To Main Content

Common Entries for Cybersecurity Attacks

Protecting Our School: Common Cybersecurity Entry Points

Every device, email, and click matters. Here’s what to watch for - and what could happen if we don’t. If you are interested in learning more, click into any of these common entries listed below:

1: Unsecured Devices (Laptops, Phones, Tablets) 

Entry Point: Personal or school-issued devices
Risk: If a device is lost, stolen, or infected, it could give attackers access to our network.
Example Attack: A teacher leaves a laptop unlocked in the classroom. A student opens private grade records and shares them.

✅ What you can do: Always lock your screen, use strong passwords, and update your devices.

 

Email Logo

2: Phishing Emails & Social Engineering

Entry Point: Your email inbox
Risk: One wrong click can give away your login or install malware.
Example Attack: An attacker sends a fake email pretending to be the principal, asking you to open a “staff meeting agenda.” It installs spyware.

✅ What you can do: Don’t click suspicious links. Verify email addresses. When in doubt, ask IT.

 

3: Unvetted Apps & Third-Party Tools

Entry Point: Software not reviewed by IT
Risk: Unapproved apps might collect or leak student data - or be hacked themselves.
Example Attack: A teacher uses a free quiz app that stores student names and grades without encryption. The app gets breached.

✅ What you can do: Use only approved digital tools. If you're unsure, check first.

 

Password icon

4: Weak or Reused Passwords

Entry Point: Staff or student login credentials
Risk: Hackers can easily guess or steal weak passwords and get into school systems.
Example Attack: A teacher uses the same password on multiple sites. One gets hacked, and attackers use that same password to access school email.

✅ What you can do: Use complex passwords and enable MFA when possible.

 

5: Outdated Systems & Software

Entry Point: Devices that haven’t been updated
Risk: Older systems often have known security holes.
Example Attack: A smartboard still running Windows 7 gets infected with ransomware after connecting to the school network.

✅ What you can do: Restart your device regularly to install updates, and report any tech that seems outdated.

 

Wifi Icon

6. Home Networks During Remote Access

Entry Point: Wi-Fi and devices outside of school
Risk: Unsecured home networks can serve as a backdoor into school systems.
Example Attack: A staff member’s child installs a game infected with malware on the same laptop used for accessing student files.

✅ What you can do: Use the school Wi-Fi network, avoid public Wi-Fi, and separate work from personal use.

 

7. Physical Access to Devices

Entry Point: Computers, servers, or unlocked classrooms
Risk: Anyone with access to devices can steal data or plug in malware.
Example Attack: A visitor enters an empty classroom and plugs in a USB stick that installs tracking software.

✅ What you can do: Lock your devices and never leave them unattended in public spaces.

 

Risk Icon

8. Insider Threats (Students or Staff)

Entry Point: Users with legitimate access
Risk: Sometimes people inside the system misuse their privileges.
Example Attack: A student with admin access to a class website deletes assignments and changes grades.

✅ What you can do: Never share your login. Report suspicious behavior. Access only what you need.

Remember: Every click, password, and device matters. You are the first line of defense.

Need help or want to report something suspicious? Contact your school IT team.