IT Security Trainings

Each employee at Westhill with access to email and/or computer systems will need to be trained in the following topics:

  1. Data Security and Privacy - Federal and State Laws

  2. Password and Workstation Security

  3. Phishing and Spearphishing

  4. Malware, Ransomware, and Viruses

Websites we are using for training

The majority of your training will be here (approx 20 min)

You will receive an email to start your training from notifications@securityiq-notifications.com You will use your Google account to authenticate to this site and save your progress.

See email SAMPLE

EdLaw2d, FERPA, COPA, CIP

Your NYS and Federal Law training on Data Security and Privacy will be in Google Classroom this year!

Click here to join the class

Reporting Phishing/Spam Emails

Everyone will have this little Chrome extension when you are logged into Chrome. If you suspect an email is phishing, you can report it with this little extension. Just click on it, and click "report email".

This little icon in Gmail will allow you to report Spam emails. This is different than Phishing as you will learn in your training. If you think you are getting SPAM emails, click this button when you open it. This will move it to trash and block the email sender.

FAQ

What is phishing?

Phishing is sending fraudulent emails, phone calls or websites by manipulating the unsuspecting users that it is from a reputable company or a legitimate organization.

Emails and sites are crafted to entice the users to click on the links by offering prizes, tricking them with relevant information or even threatening them. Those links may contain a malicious virus, install hazardous software or may steal personal information from your device like username-passwords, etc.

What is spam?

Spam is flooding the Internet with the same message sent to millions. The majority of spam is commercial advertising for products that might seem rather suspicious. They want you to buy their dubious wares, access their dubious sites, or just forward their message to others. It is different than phishing where it is not targeted or trying to get information from you.

What are ways to identify a phishing scam?

As you will learn throughout your training, there are several ways of identifying a phishing email:

  • Spelling and grammar mistakes: Emails from legitimate companies don't usually have spelling or grammar mistakes.

  • False credentials: Don't trust an email just because the name displayed matches a trustworthy organization, check the senders email address. Sometimes they are similar to, but not the same as a company's official email address. For example: important@google.com isn't an official email from Google. If you're ever unsure about the legitimacy of an email with a company you may use regularly, go directly to the companies website and conduct your business there.

  • Legitimate business practices: No legitimate business will ask for anything confidential over email. This includes providing your password or social security number

  • Malicious links: Never click on a link without first hovering over it to see where it is taking you. Phishers use misleading domains that at first glance look genuine. For example: google.com.xyz.com has Google in it, but really would take you to xyz.com which could be malicious. Link manipulation techniques also include misspelled urls (banksofamerica.com) or "typosquatting" (trustedbank.com instead of trusted-bank.com).

  • Reliance on Coincidence: If you weren't expecting it, don't click on it.

How do I quickly lock my workstation?

These days, computer security is very important. Locking your computer while you're away will help protect confidential documents, emails, student information and grades from getting into the wrong hands.

Mac:

One of the easiest ways to lock your screen is by going through the menu bar. Navigate your cursor to the Apple logo in the top left of your screen, from the drop down menu choose 'Lock Screen'.

Another easy way to lock your screen using your keyboard is by holding down command, control and Q at the same time.

Chromebook:

Choose one of the following options:

  • On a keyboard: Press Search + L. Or press Launcher + L.

  • At the bottom right of your screen, select the time. Select Lock .

  • Hold the power button for a second or so until the option appears on your screen to lock it.


What is the difference between malware and ransomware?

Malware is any file or a malicious code designed to cause damage to a user’s personal computer and network. It can control data and resources, cause error, destroy system and slow down the performance.

Ransomware is a form of malware designed to block access from system until a ransom fee is paid. It provides profit to the ransomware programmers by getting money from user for unlocking the system.

How do I create strong passwords?

The key to your online security is to have strong passwords. If your data is compromised, weak passwords can have serious consequences, like identity theft.

  1. Avoid common words and character combinations in your password. Avoid using your name, nickname, children or pet's name, or anything associated with you, especially if they could find that information on social media.

  2. Longer passwords are better: 8 characters is a starting point. Although Google recommends 12. Make sure numbers and symbols are included.

  3. Use numbers in place of letters.

  4. Make your password unique. Avoid using the same password on multiple accounts like your online banking and your email.

  5. If you struggle to remember passwords, try using a phrase you're familiar with and incorporating shortcut codes or acronyms. For example:

4Scor3&7yrsAgo (Four score and seven years ago - from the Gettysburg Address)

iabiapis1980# (it's a bird, it's a plane, it's superman)

How do I keep Chrome up to date?

  1. On your computer, open Chrome

  2. At the top right, look at More (The three stacked dots)

  3. Click Help > About Chrome

This will check if you are using the latest version of Chrome.

How do I check for updates on my Chromebook?

  1. At the bottom right, select the time.

  2. Select Settings .

  3. At the bottom of the left panel, select About Chrome OS.

  4. Under "Google Chrome OS," you'll find which version of the Chrome operating system your Chromebook uses.

  5. Select Check for updates.

  6. If your Chromebook finds a software update, it will start to download automatically.

After the update downloads, it may ask you to restart your Chromebook to apply the updates.

Why is it important to keep my computer and browser up to date?

The most important reason to keep your browser up-to-date is to keep your computer safe and secure, protecting you from identity theft, phishing attacks, viruses, trojans, spyware, adware, and other sorts of malware. Many browser updates are issued to combat just these problems.

Other Resources

NTK_Infographics_GeneralSecurity.pdf
Infographic-NCSAM_Phishing.pdf
Infographic-NCSAM_PasswordSecurity.pdf
10_Ways_to_Recognize_and_Combat_Social_Engineering.pdf
tipsheet_Insider_Threats.pdf
NTK_Infographics_Malware.pdf