{"id":2564,"date":"2020-02-13T15:44:02","date_gmt":"2020-02-13T15:44:02","guid":{"rendered":"https:\/\/technology.dearbornschools.org\/?p=2564"},"modified":"2020-02-13T15:44:13","modified_gmt":"2020-02-13T15:44:13","slug":"a-banner-year","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/technology\/2020\/02\/13\/a-banner-year\/","title":{"rendered":"A Banner Year"},"content":{"rendered":"\n<p>Well, it&#8217;s been a banner year. Unfortunately, the banner year is in identity theft and breaches. The number of reported breaches in <strong>Education<\/strong> rose from 1,257 in 2018 to 1,473 in 2019. The number of sensitive records exposed in the <strong>Education<\/strong> field tallies up to 3,606,114 (an increase from 1,414,624 in 2018). Non-sensitive records exposed tallies up to 22,747 (which is down slightly from 39,690 in 2018). Thus, breaches in the Education sector are mostly increasing. These are the <span style=\"text-decoration: underline;\">reported<\/span> breaches.  <\/p>\n\n\n\n<p>This is not surprising as more and more of our life is conducted online. More and more of our information is housed online as well. <\/p>\n\n\n\n<p>For us, this information falls into two camps: work and home. We take security very seriously here at work. We also want to help inform you about what this means for you at home. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Work<\/h2>\n\n\n\n<p>We have taken many steps to help promote safety and security at work. Here are just a few examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>changed password requirements so that users would be encouraged to create more secure passwords<\/li><li>removed local Admin rights to computers to protect against malware installation<\/li><li>added banners on emails that come from unverified domains<\/li><li>updated settings for security issues<\/li><\/ul>\n\n\n\n<p>Please remember that many of our staff have access to important data for students and staff. It is staff responsibility and legal obligation to protect that data. <\/p>\n\n\n\n<p>Phishing is one area where we see attempts to collect user information. We regularly block phishing attempts. However, it is up to end-users to help us identify some of these. It only takes one incident to put all of us at risk. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Home<\/h2>\n\n\n\n<p>We&#8217;ve published tips (like &#8220;<a href=\"https:\/\/technology.dearbornschools.org\/2018\/10\/01\/password-management\/\">Password Management<\/a>&#8220;, &#8220;<a href=\"https:\/\/technology.dearbornschools.org\/2016\/02\/12\/password-tips\/\">Password Tips<\/a>&#8220;, &#8220;<a href=\"https:\/\/technology.dearbornschools.org\/2020\/01\/17\/phishing-attempts-continue\/\">Phishing Attempts Continue<\/a>&#8220;, &#8220;<a href=\"https:\/\/technology.dearbornschools.org\/2019\/01\/24\/can-you-spot-the-phishing-attempt\/\">Can You Spot the Phishing Attempt<\/a>&#8221; and even a <a href=\"https:\/\/technology.dearbornschools.org\/2016\/03\/23\/phishing-4\/\">Comic to explain Phishing<\/a>). <\/p>\n\n\n\n<p>These are all still valid. Remember, it only takes a second to give up information that can compromise your security. I have a friend who basically spent two solid months of his life trying to recover from an identity thief situation. <\/p>\n\n\n\n<p>Generally, more and more people are using their phones to conduct business and their online life. Phones are a bit unique. Our defenses tend to be at the lowest while on a phone (frequently we are doing something else, rushing to do something else, etc). <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tips<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Think before you Click<\/strong> &#8211; Remember links are how many problems start. You should always know why you are clicking a link. When in doubt, you should type the URL in the URL box yourself instead of clicking on a link.<\/li><li><strong>Never share your credentials <\/strong>&#8211; This is illegal (like Federal law illegal) while at work. It is a really bad idea everywhere. <\/li><li><strong>Update<\/strong> &#8211; Updates generally fix security issues. Do be aware of pop-ups that purport to be an update though. <\/li><li><strong>Password Management<\/strong> &#8211; Utilize strong passwords. Do NOT reuse passwords. A password manager is the best way to make that happen. <\/li><li><strong>Be aware of Phishing<\/strong> &#8211; Know the hallmarks of a phishing attempt. Be critical of requests and links that require you to sign in. <\/li><li><strong>Back up your Data<\/strong> &#8211; Back up your valuable data using the <a href=\"https:\/\/searchdatabackup.techtarget.com\/definition\/3-2-1-Backup-Strategy\">3-2-1 method<\/a>. <\/li><li><strong>Be wise<\/strong> &#8211; Do NOT fall into the &#8220;it can&#8217;t happen to me&#8221; camp. Everyone is a target. Cybercriminals don&#8217;t know their targets. Your data is probably already out there and available from one of the data breaches. Check out &#8220;<a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned<\/a>&#8221; to see if your email address was part of a breach. This will show you where and what was accessed. <em>(*Note that 1Password now owns this site so there is a &#8220;soft&#8221; sales pitch for 1Password)<\/em>.<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>It was a banner year for breaches. Find out how much of that was from the Education field. Also find out how you can help protect yourself. [Read time: ~3 minutes]<\/p>\n","protected":false},"author":6,"featured_media":2565,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-2564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-new-category"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/posts\/2564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/comments?post=2564"}],"version-history":[{"count":1,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/posts\/2564\/revisions"}],"predecessor-version":[{"id":2566,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/posts\/2564\/revisions\/2566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/media?parent=2564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/categories?post=2564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/technology\/wp-json\/wp\/v2\/tags?post=2564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}