Common Entries for Cybersecurity Attacks
Protecting Our School: Common Cybersecurity Entry Points
Every device, email, and click matters. Here’s what to watch for - and what could happen if we don’t. If you are interested in learning more, click into any of these common entries listed below:
1: Unsecured Devices (Laptops, Phones, Tablets)
Entry Point: Personal or school-issued devices
Risk: If a device is lost, stolen, or infected, it could give attackers access to our network.
Example Attack: A teacher leaves a laptop unlocked in the classroom. A student opens private grade records and shares them.
✅ What you can do: Always lock your screen, use strong passwords, and update your devices.
2: Phishing Emails & Social Engineering
Entry Point: Your email inbox
Risk: One wrong click can give away your login or install malware.
Example Attack: An attacker sends a fake email pretending to be the principal, asking you to open a “staff meeting agenda.” It installs spyware.
✅ What you can do: Don’t click suspicious links. Verify email addresses. When in doubt, ask IT.
3: Unvetted Apps & Third-Party Tools
Entry Point: Software not reviewed by IT
Risk: Unapproved apps might collect or leak student data - or be hacked themselves.
Example Attack: A teacher uses a free quiz app that stores student names and grades without encryption. The app gets breached.
✅ What you can do: Use only approved digital tools. If you're unsure, check first.
4: Weak or Reused Passwords
Entry Point: Staff or student login credentials
Risk: Hackers can easily guess or steal weak passwords and get into school systems.
Example Attack: A teacher uses the same password on multiple sites. One gets hacked, and attackers use that same password to access school email.
✅ What you can do: Use complex passwords and enable MFA when possible.
5: Outdated Systems & Software
Entry Point: Devices that haven’t been updated
Risk: Older systems often have known security holes.
Example Attack: A smartboard still running Windows 7 gets infected with ransomware after connecting to the school network.
✅ What you can do: Restart your device regularly to install updates, and report any tech that seems outdated.
6. Home Networks During Remote Access
Entry Point: Wi-Fi and devices outside of school
Risk: Unsecured home networks can serve as a backdoor into school systems.
Example Attack: A staff member’s child installs a game infected with malware on the same laptop used for accessing student files.
✅ What you can do: Use the school Wi-Fi network, avoid public Wi-Fi, and separate work from personal use.
7. Physical Access to Devices
Entry Point: Computers, servers, or unlocked classrooms
Risk: Anyone with access to devices can steal data or plug in malware.
Example Attack: A visitor enters an empty classroom and plugs in a USB stick that installs tracking software.
✅ What you can do: Lock your devices and never leave them unattended in public spaces.
8. Insider Threats (Students or Staff)
Entry Point: Users with legitimate access
Risk: Sometimes people inside the system misuse their privileges.
Example Attack: A student with admin access to a class website deletes assignments and changes grades.
✅ What you can do: Never share your login. Report suspicious behavior. Access only what you need.
Remember: Every click, password, and device matters. You are the first line of defense.
Need help or want to report something suspicious? Contact your school IT team.