In this training, learners will:
Define the acceptable usage of technology systems with the school that are demonstrated within the Acceptable Use Policy.
Demonstrate and choose the appropriate behaviors that maintains Online Safety and security while using technology and the Internet.
Familiarize yourself with the schools most up-to-date Acceptable Use Policy. The technology department continuously update it according to the school's technological improvements and enhancements.
Please take some time to go through the policies carefully, and if there is anything unclear, contact: helpdesk@bayanschool.edu.bh.
Even before the pandemic hits, we have been using the Internet to complete our tasks and communicate with other individuals, whether in your personal or professional lives. It is very important to be aware of the dangers of sharing personal information through direct and indirect ways. For this training, the National Cybersecurity Alliance created a series of fun and short videos illustrating different situations to avoid at the workplace. Remember: It is the responsibility of EVERY individual in the organization to maintain cybersecurity.
Video 1: Never Share your Passwords
(3:09 min)
Although the passwords in the school are unified to assist you in accessing the different systems, it is very important to protect your credentials. Never share your password with anyone. For your personal devices, always use the two-factor authentication to maintain the security of your accounts.
Video 2: Protect Your Personal Data
(2:01 min)
It is extremely important to maintain your privacy online. When sending private data, always verify that the recipient is that appropriate person to receive it. You have a responsibility to maintain the privacy of both your data, and the students' data as well.
Video 3: Lost Devices
(1:59 min)
We keep huge amounts of data on our personal and work devices. When you are in a situation where your device was either lost or stolen, it is extremely important to notify the IT department immediately to avoid any loss of data and/or money.
Video 4: Phishing and Ransomware
(2:34 min)
Phishing is a very common way used by cybercriminals to steal information, gain access to your data, or attack your devices with viruses. It is very important to check the "sender" of the email when you receive an email from outside of the organization, and report it directly to the IT Department.
Video 5: Removable Media (USBs)
(1:29 min)
Now that we have access to all sorts of online sharing environments, our need to use USBs and removable media. However, if you need any type of removable media, always make sure that it is from a trusted source. Never use a removable media that you found in an unknown place.
Video 6: Voice Phishing (Vishing)
(2:26 min)
Vishing or Voice Phishing is a another common way used by cybercriminals to steal information, in this case, the request will be in a type of a phone call you receive claiming that you won an award, and sometimes claiming that it is your Bank requesting your information. It's very important to remember: NO credible resource will request your Credit Card number over the phone, never share it!
Video 7: Downloading Software
(1:40 min)
It's very common that you come across a free-software that claims to do a certain task. On the work's computer, the department disabled the download option to maintain security. However, the best practice is to NEVER download any software from a suspicious source.
Video 8: Public WiFi
(2:06 min)
You've certainly been to public cafes and places to complete your work and change scenery. However, it is important to ensure that you connect to secure WiFi connections to maintain the security of your credential and personal information.
The internet is filled with sources and information to assist you in maintaining your online safety and security. Below are some useful resources that you can explore to get more in-depth information:
Click Here to access the Online Safety Basics from the National Cybersecurity Alliance.
Click Here for another Cybersecurity Training Video by Burgi Technologies.
Click Here to access a wide variety of resources about Cybersecurity and awareness from Stop Think Connect.
Click Here to access a resource in Arabic to introduce to the different cybersecurity awareness topics.
When you are done with the session's material, please click on the below button to fill out a quick-assessment form indicating that you went through the material.