CyberSecurity Guide
CyberSecurity Guide
and
Guidance for schools
Sept’ 2024
Email: [email protected]
Overview
• What is Cybersecurity
• What is a Cyberattack
• Data brokers are companies that collect or purchase public, personal, private info’
about you and then sell that data. (over 5,000 brokers, revenue of over €250
Billion per year)
• Consumer data is valuable, where you shop online, credit card details, coupons
store’s loyalty card, facebook pages you like, what you spend money on,
birthday, addresses, your job title, your interests.
• Information on the Public Record: includes court records, motor vehicle records,
census data, birth certificates, marriage licenses, voter registration information,
bankruptcy records, divorce records.
• If you spend a lot of time on social media or in the online world, you're giving
data brokers even more information about you. Data brokers collect personal info
from the posts you've made or ‘liked’ online, online quizzes you've taken, and the
websites you've visited.
• Some data brokers act legally using public data, many act illegally
https://us.norton.com/blog/privacy/how-data-brokers-find-and-sell-your-personal-info
HSE Ransomware attack
• A malicious email was received on one PC on 16th March, it was opened 2 days later
• A Microsoft Excel attachment which contained ‘malware’ was downloaded
• 31st March: HSE AV software detected unusual activity, but checks were inconclusive
• Over next few weeks the attackers secretly gained further system access
• Attackers ‘activated’ ransomware on 14 May 2021, 8 weeks after initial file download
Recovery:
• 6 weeks later, 75% of servers and 70% of devices were restored
• By Sept, 4 months later, 95% of servers & devices were restored
• Though no ransom was paid, the attack cost the HSE over €100 million
School data breach
https://www.irishtimes.com/news/ireland/irish-news/primary-school-pupils-data-held-to-ransom-by-hackers-1.3044951
• 2016: a data breach report from a primary school • Commissioner found the school had broken the law by
• Ransomware attack by a third party. failing to ensure that adequate security measures were in
• School’s files, which included children’s names, dates of place to protect the student data. Her office recommended
birth and PPS numbers, inaccessible. to the school that it take steps ‘to mitigate the risks
identified’.
• The Commissioner found the school had deficiencies in the
measures it had taken to secure pupils’ personal data, • The school implemented staff training on the risks
including the fact that no polices or procedures were in associated with email and the use of personal USB keys
place to maintain adequate back-ups. and also reviewed its procedures to ensure appropriate
contracts were in place with its ICT providers.
• No procedures or policy documents focusing on system
attacks such as ransomware or viruses and had no contracts • Commissioner stated that: “This case demonstrates that
in place with its ICT services providers, the data processors, schools, like other organisations interacting online must
as required by law. ensure that they have appropriate technical security and
organisational measures in place to prevent loss of
• Actions by ICT suppliers were ‘inadequate in response to the personal data, and to ensure that they can restore data in
attack’. the event of crypto-ransomware attacks’
• A lack of staff training and awareness of the risks associated
with opening unknown email attachments or files.
Types of Cyberattack
https://www.preemptive.com/five-evil-things-a-hacker-does-to-your-app/
Spoofing
https://www.g2.com/articles/spoofing
Identity Theft
Ransomware
https://us.norton.com/blog/malware/types-of-malware
Zero-Day
https://www.avast.com/c-malware
https://www.itprotoday.com/vulnerabilities-and-threats/how-tell-
if-ransomware-message-real-or-fake
https://spanning.com/blog/zero-day-vulnerability/
Human Factor, Internet of Things (IoT)
https://ssdtechie.com/2020/07/06/the-human-factor-in-cybersecurity-employees/
https://www.mcafee.com/blogs/enterprise/cloud-security/how-to-create-a-
strong-password-you-actually-remember/
https://enterprisersproject.com/article/2016/2/internet-hackable-things-why-iot-devices-need-better-security
https://obtsynergy.com/why-you-are-your-biggest-online-security-threat/
Impact of Ransomware
Implications of Personal/Work mix
Personal Work/School
https://www.insurancebusinessmag.com/us/news/cy
ber/social-media-activity-exposing-many-users-to- https://www.dnainfo.com/chicago/20170519/chinatown/st-therese-chinese-
cyber-risks--report-245417.aspx catholic-school-principal-phyllis-cavallone-jurek-stanley-c-golder-leadership-
award/
Schools and Cybersecurity
• If schools cannot or would not pay ransoms, why are they a target of cyberattacks?
• Schools have large numbers of potential targets, manage increasing amounts of
personal data, and so this data can be seen as an ‘attractive’ target.
• Online criminals:
Attempt to steal and sell important data using ransomware attacks etc.,
• Hackers:
may not be financially motivated, but want to cause disruption or reputational damage to schools
• Phishing Campaigns:
These attacks leverage ‘social engineering’ and mimic genuine providers to deceive schools into
providing login and password details, credit card information etc.,
• Malicious Insiders:
Disgruntled staff or unhappy students may use their access to a school’s IT systems to carry out
malicious activity to cause disruption or reputational damage.
External Parties
Improving Data and
Prevention: Awareness/Education Cybersecurity
for Staff & Students
Malware
https://us.norton.com/blog/malware/types-of-malware
Phishing
https://www.csoonline.com/article/2117843/what-is-phishing-examples-
types-and-techniques.html
https://us.norton.com/blog/privacy/5-tips-for-social-media-security-and-
privacy
Can technology prevent Cyberattacks?
• Trojans: malware that conceals its real content. Like the ‘Trojan Horse’
used to attack the city of Troy (~1200 BC), harmful content is hidden
‘within’ the trojan delivery agent
Phishing Attack
• Phishing can occur through email ‘spoofing’ • Often phishing attacks are indiscriminately
or phone calls where an attacker pretends to directed towards a large number of users by
be a ‘trusted’ party email or phone
Overall Principle:
Access to data and resources to be based on work related ‘need’
• Policies need to be consistent with school culture, & based on consultation
• Access to data and resources needs to be restricted to those who really need it.
• The number of data administrators (ie ‘admin accounts’) need to be minimized
• All ‘admin accounts’ need to be approved by the School Principal
• Data to be stored securely
• Robust data backups to be in place
• Possible examples:
• Student devices not to have access to Leadership/Admin or Staff network areas
• Policy on USBs for staff - USBs to be used for school work only, AV Scan
• Policy on USBs for students - USB to be used for school work only, AV scan
• Policy on school owned teacher mobile devices, to be used for school work only
• Consider enforcing two factor authentication (at least for staff)
•
backup-and-recovery-trends-have-on-organizations-d65195a021b6
The ‘standalone’ location could be a separate
drive or could be on a ‘cloud based’ service
Secure Wifi, Software updates
https://www.sancuro.com/blog/post/why-software-updates-are-so-important/
New Email – Open or Delete?
https://us.norton.com/blog/emerging-threats/internet-scams
Privacy: Social Media Cleanup
https://us.norton.com/blog/privacy/social-media-clean-up
Viruses – Need for AV on different types of devices
• A software virus is a type of malicious software, or malware, that attaches itself to existing files, for
example to Microsoft Excel or Word files.
• When these files are opened the virus activates and spreads between computers and causes damage
to data and software.
• Viruses aim to disrupt systems, cause operational issues, and result in data loss and leakage.
• Virus can be used with other types of malware to carry out ransomware attacks.
• Viruses need a user action, such as opening a file, to activate.
• Other types of malware such as worms don’t need a user action to be activate.
• Antivirus (AV) is software that detects, and quarantines the virus. Using a regularly updated database
of malware and viruses, it scans a device for viruses. No antivirus protection is 100% effective but is
recommended especially for Windows based devices.
• Chromebooks and Apple devices may be considered a ‘lower risk’ of being infected by ‘viruses’,
however they are still at risk from other cyberattacks including phishing etc.
https://www.security.org/antivirus/
iPads and Viruses
• In general Apple iPads cannot get viruses unless the user is jailbreaking, meaning is
downloading apps from outside of the App Store.
• If you’re using iPads as intended and only downloading apps from the App store, it’s
unlikely to get viruses.
• The reason why iPads do not get viruses is that every app in the App store is scanned for
malicious code.
• Also each app is isolated from one another so viruses can’t spread to other systems
• As with all other types of devices iPads can’t protect users from Phishing, scams etc
• While it’s unlikely that an iPad has a virus, you can tell if it has a virus if your mouse moves
without you touching the trackpad, you are getting a lot of pop-ups, your passwords stop
working, etc.
https://www.security.org/antivirus/ipads/
Managing Passwords
Ransomware tips:
Most of the ransomware attacks are linked to poor protection practices by employees.
1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there
is no guarantee that you will be able to regain access to your files.
3. Do not provide personal information when answering an email, unsolicited phone call, text message or
instant message. Phishers will try to trick employees into installing malware, or gain intelligence for
attacks by claiming to be from IT. Use reputable AV software and a firewall.
4. Make sure that all systems and software are up-to-date with relevant patches.
5. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi
https://us.norton.com/blog/emerging-threats/ransomware-what-can-you-do-about-it#
Spotting Fake/Spoofing Websites
https://www.dataprotection.ie/
Reporting Cybersecurity
Incidents and Crimes
Types of incidents and level of support
• A cybersecurity incident is considered to be any adverse event that threatens the
confidentiality, integrity, authenticity or availability of a network or information system.
• As a member of the public if you feel that you have experienced a cyber security incident
that may have a national impact please contact the NCSC at the email [email protected].
• The level of support given by NCSC will vary depending on the type and severity of the
incident, the constituent and/or constituents impacted and available resources.
Cybersecurity vs Cybercrime
• There are a number of cyber-related events which may not be considered as cyber security
incidents but could constitute a cyber crime. Cyber bullying, threats via email, text or instant
message, online fraud or online extortion are all examples of potential cyber crimes.
• If you feel you have been a victim of a cybercrime you should contact An Garda Síochána.
Network Security: Fit for purpose router and firewall in place to prevent unauthorised access and
malicious content.
User Awareness: Produce security policies detailing the correct and secure use of devices and online
systems. Regular cyber security awareness training.
Malware Prevention: Produce appropriate policies on malware, install anti-virus protection on the
school’s devices. Disable USB ports unless strictly necessary.
Account Security: Manage and limit user access as well as monitoring user activity. Create a
password policy. Recommend strong and unique passwords for accounts and services. Consider
using a password manager to store passwords. Enable multi-factor authentication (MFA) on all
accounts if possible.
Backups: Create backups regularly and consider a cloud solution. Have policy to control all access to
removeable media, limit media types and scan media before importing onto the network. Apply
software updates as they become available.
Prepare: Develop an incident plan and involve staff. Document contact details of external people
who can help during an incident. Monitor systems and network for unusual activity.
Guidance on CyberSecurity: Useful Links