{"id":138906,"date":"2021-08-02T06:00:40","date_gmt":"2021-08-02T13:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=138906"},"modified":"2021-07-29T11:09:13","modified_gmt":"2021-07-29T18:09:13","slug":"back-to-school","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/08\/back-to-school\/","title":{"rendered":"Cybersecurity Tips From Unit 42 for the 2021 Back to School Season"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As we gear up for a return to school, aligned with the latest COVID-19 guidance to keep students, their parents and teachers healthy, it\u2019s also critical to remember to practice basic cybersecurity hygiene to stay safe online.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">School districts tend to run older equipment and older software, which means that they\u2019re more susceptible to cyberattacks since legacy systems are more difficult to update. Compounding this problem, many students, parents and teachers are not following cybersecurity best practices with their devices. This creates potential for hackers to wreak havoc on educational institutions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">New data from Palo Alto Networks reveals that the percentage of traffic from phishing URLs (which direct users to fake websites to steal personal information) targeting the education industry <\/span>globally<span style=\"font-weight: 400;\"> increased 47% in June and 27% in July, which shows that hackers are ramping up their attacks ahead of back to school season.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">3 Tips for a Safe Return to School<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><strong>1. Use different passwords for different accounts and devices.<\/strong><\/p>\n<p>This is a security best practice that everyone struggles with. A 2020 report by <a href=\"https:\/\/www.secureauth.com\/newsroom\/53-of-people-admit-they-reuse-the-same-password-for-multiple-accounts\/\" rel=\"nofollow,noopener\" >SecureAuth<\/a> revealed that 53% of people admit they reuse the same password for multiple accounts, which makes it easy for hackers to hijack accounts and steal personal information.<\/p>\n<p>This is a common problem at schools. For example, I\u2019ve seen instances where teachers share passwords for streaming services in the classroom. This type of password sharing can be exploited by hackers to steal credentials and potentially compromise accounts for other online services if the same email and password is being used.<\/p>\n<p>Use a strong username and password for every account and device, then use a password manager to keep track of everything. From there, use a strong username and password for the password manager itself and make sure to enable two-factor authentication (2FA) as well. Two-factor authentication strengthens security by requiring two methods to verify your identity, such as something you know (for example, a password) and something you have (for example, a device). Two-factor authentication secures your logins from hackers, who exploit weak or stolen credentials. With 2FA enabled, the password manager has an added layer of security for the personal information it holds.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2. Get involved: Make sure your school district is prepared.<\/strong><\/p>\n<p>With cyberattacks running rampant against school districts across the country, it\u2019s important to be aware of whether your school district is protecting your child\u2019s privacy and taking steps to prevent hackers from disrupting their education.<\/p>\n<p>Last year, the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-345a\" rel=\"nofollow,noopener\" >joint advisory<\/a> warning of ransomware attacks, Distributed Denial-of-Service Attacks (DDoS) and video conference disruptions against schools. With limited cybersecurity defenses due to scarce budgets, schools are often extremely vulnerable and hackers are taking advantage.<\/p>\n<p>Ransomware, in particular, has become a global crisis, with education a heavily targeted sectors. There are many examples of schools being impacted because of ransomware; in one case, hackers demanded <a href=\"https:\/\/apnews.com\/article\/technology-fort-lauderdale-florida-ac217a0759194dc3c717b421ae05bd0c\" rel=\"nofollow,noopener\" >$40 million<\/a> to avoid posting students\u2019 and teachers\u2019 personal information online.<\/p>\n<p>Students\u2019 personal information is especially valuable for hackers because children and their parents are less likely to notice that someone is using their identity to commit fraud, especially if they don\u2019t have a bank account in the child\u2019s name to alert them.<\/p>\n<p>Ask your school district what they\u2019re doing to protect against cyberthreats. Are they investing in cybersecurity solutions to protect their infrastructure and your child\u2019s information? Are they raising awareness on security issues with training for students and teachers? The more you can learn about your school district\u2019s cybersecurity preparedness, the better.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>3. Recognize that your children are tech savvy, but not cyber savvy.<\/strong><\/p>\n<p>Today\u2019s children are growing up in the digital age of screens and social media, and it can be difficult as a parent to keep pace with the latest technologies and platforms. According to a <a href=\"https:\/\/www.pewresearch.org\/internet\/2020\/07\/28\/parenting-children-in-the-age-of-screens\/\" rel=\"nofollow,noopener\" >2020 Pew Research Center survey<\/a>, 66% of parents say that parenting is harder today than it was 20 years ago with many citing technology as a reason why.<\/p>\n<p>Familiarize yourself with your children\u2019s devices and learning platforms, particularly with how to configure parental controls and privacy settings. Children know the workarounds, so you\u2019ll need to be vigilant about the content they have access to.<\/p>\n<p>That said, children are less likely to be aware of security best practices. Make sure that you're practicing basic cybersecurity hygiene with your children and their devices, including enabling 2FA, knowing how to spot a phishing scam, installing the latest software patches, covering up webcams when they\u2019re not in use, avoiding the use of public Wi-Fi networks and, as mentioned previously, using strong passwords.<\/p>\n<p>Children are taught basic safety tips like not talking to strangers and fastening their seat belts in the car. It\u2019s critical to also teach them basic online-safety tips to protect their digital way of life \u2013 at home and in the classroom.<\/p>\n<p><em>For more tips on digital home safety, see \u201c<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/07\/stop-ransomware-attacks\/\"><em>Cybersecurity Tips From Unit 42 to Help Stop Ransomware Attacks<\/em><\/a><em>,\u201d \u201c<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/11\/u42-cybersecurity-tips-safer-holiday-shopping\/\"><em>Cybersecurity Tips From Unit 42 for the 2020 Holiday Shopping Season<\/em><\/a><em>\u201d and \u201c<\/em><a href=\"https:\/\/blog.paloaltonetworks.com\/2020\/10\/cc-household-cio\/\"><em>Cybersecurity Tips From Unit 42 for the Household CIO of 2020<\/em><\/a><em>.\u201d<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a safe return to school, here are three cybersecurity tips for students, parents and teachers from Unit 42. <\/p>\n","protected":false},"author":89,"featured_media":138907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,6724],"tags":[3967,7314,586],"coauthors":[736],"class_list":["post-138906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-points-of-view","tag-best-practices","tag-cybersecurity-tips","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/07\/Portrait-of-Young-Man.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=138906"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138906\/revisions"}],"predecessor-version":[{"id":138982,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/138906\/revisions\/138982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/138907"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=138906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=138906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=138906"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=138906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}