Summary
Students, faculty, parents, and guardians across New Jersey are preparing for the beginning of a new academic school year unlike any other. As academic institutions reopen for the 2020-2021 school year, the pandemic put a new spin on the typical back-to-school stress. Of the estimated 600 public school districts across NJ (not including charter or private schools), 434 will offer a hybrid option combining in-person and remote learning, 242 will open with an all-remote learning program, and 68 will offer all in-person classes, with many NJ colleges and universities also opting for all-remote learning. Consequently, for most academic institutions in the state, in-person classrooms and notebooks are substituted for video-teleconferencing (VTC) platforms and laptops for at least part of student instruction. The speed with which these institutions and districts accommodated a remote learning environment likely has, or will result in, many cybersecurity challenges. Additionally, the education sector continues to be one of the most targeted sectors by cyber threat actors. These factors, coupled with the unfamiliarity some may experience while navigating this new educational environment, increase the cyberattack surface and leave many users vulnerable to various forms of cyberattacks and other malicious activity.
As such, we have created this guide to address cybersecurity concerns and compile best practices in an effort to assist students, faculty, parents, and guardians in addressing cyber safety and security concerns, navigating cyber-specific challenges they may encounter, and bolstering their cyber-resiliency. This compilation was created through coordinated efforts with the NJ State Police Cyber Crimes Unit (NJSP CCU) and the Digital Technology Investigations Unit (DTIU). The below sections will address best practices for device security, email and cloud service use, account security and the importance of multi-factor authentication (MFA), VTC security, internet safety, and securing home Wi-Fi routers and networks.
Download a PDF of this guide by clicking here.
Back-to-School Device Security
As the new school year starts, many devices with different operating systems and configurations will be exposed to numerous risks when connected to resources and networks not controlled by their academic institution. These devices are either personally-owned or provided by their academic institution and include desktops, laptops, tablets, mobile devices, and internet-of-things (IoT) products. These systems can provide threat actors with additional attack vectors to connect to networks, infect other devices, and exfiltrate data. Below are some general device cybersecurity best practices:
- Use approved resources and platforms. Use only approved resources and platforms for academic communications to ensure they are trusted and secure.
- Keep hardware and software, including mobile device operating systems and applications, up to date. Keeping programs up to date ensures they are patched against known vulnerabilities that could be exploited by threat actors to gain unauthorized access to your device and/or data.
- Run an updated anti-virus/anti-malware program. Keeping these programs up to date ensures they contain the latest signatures and data necessary to identify malicious software and processes.
- Check privacy and security settings. Checking these settings will help manage your cyber risk and limit how and with whom you share information.
- Set up parental controls. Setting up parental controls allows the ability to control privacy and usage, content filtering, and location and monitoring settings to ensure internet use is safe and secure.
- Secure physical devices. Safeguard devices and ensure a password/passcode or biometric authentication is enabled for all devices to prevent unauthorized access in the event a device is lost or stolen, or USB or external device is inserted.
- Cover and/or disconnect your camera when not in use. Covering or disconnecting your webcam and microphone when class is not in session prevents malware from taking control of your camera to spy on you and your surroundings. Additionally, when the camera is in use, ensure no sensitive information is visible.
- Backup devices. Protect your schoolwork and information from malware, hardware failure, damage, loss, or theft by making multiple copies and storing them offline.
- Implement protective technologies. With remote learning, IT departments are advised to implement endpoint detection and response software, web content filtering software, host-based firewalls, device and file encryption, and keep devices updated with latest security patches.
Best Practices for Email Use
Email is a commonly used method of communication in academic institutions and it is important to be vigilant about what is clicked on, downloaded, and transmitted, especially with the increase in social engineering tactics and spoofed domains. Threat actors may send phishing emails that appear to be from a trusted classmate, teacher, or colleague, and contain attachments or links that, if clicked. attempt to install malware or direct the target to a spoofed website to steal credentials or other sensitive information. Stolen credentials could then be used to send “trusted” emails to others in the academic institution to further compromise accounts or infect systems and networks with ransomware or other malware. Below are some general email best practices:
- Identify common red flags. Suspicious emails may contain external email tags but purport to come from internal sources, grammar and spelling errors, oddly placed upper and lower-case letters, incorrect or missing signature blocks or company logos, or words uncommonly used in everyday communications.
- When in doubt, throw it out: If a message or a request looks suspicious or is “too good to be true,” delete it.
- Refrain from taking action, such as clicking links or opening attachments, on any emails received from unknown senders. Links and attachments delivered in emails are the most common tactics used by threat actors to deliver malware to end user devices.
- Confirm the legitimacy of emails from known senders that request sensitive information by contacting the sender via a separate means of communication. Threat actors often impersonate legitimate and known individuals and academic institutions to convince targets to take a desired action that would compromise their device, data, or account.
- Say “no” to macros. If a file is accidentally downloaded, refrain from enabling macros or content as this is often a technique used to deliver malware.
- Verify domain names. Hover your mouse over the link to verify the URL before clicking or, instead, manually type the URL directly into the address bar of your browser. Once the website’s legitimacy is confirmed, bookmark the page when needed.
The Importance of Securing Accounts
Account credentials—username and password—are the keys to the kingdom and the primary target of many threat actors. The sudden shift to cloud services, remote learning, and remote working has contributed to the increase in credential-based attacks. Cloud service accounts, such as Microsoft Office 365 and Google’s G Suite, allow users to access email and documents, which contain mission-critical applications and sensitive data. If an account is compromised via credential theft or data breach, threat actors have the opportunity (absent MFA) to gain unauthorized access that allows them to further compromise accounts and systems, thus increasing the attack surface significantly. Examples include launching internal attacks, sending malware through email to students or teachers, stealing additional credentials, and accessing and stealing data from other applications in the cloud service. Although multi-factor authentication (MFA) may seem like an inconvenient step in addition to account credentials, it is an important one—not only to protect an individual account, but also the community at large. Below are some general account best practices:
- Refrain from sharing login credentials or other sensitive information. Login credentials and other sensitive information should not be shared with anyone or saved on your computer or cloud storage platforms. If requested, consult a parent or guardian first before sharing.
- Keep account credentials safe. Keep a list that is stored in a safe, secure place offline and away from your computer, or use a service like a password manager to keep track of your passwords.
- Use unique, complex passwords for all accounts. Having unique passwords for each account prevents password reuse attacks, in which threat actors obtain your password for one account and use it to compromise an additional account using the same credentials.
- Enable MFA where available. MFA is the use of two or more factors in order to authenticate to an account or service. This significantly reduces the risk of account compromise via credential theft in which your password has been exposed.
- Update passwords immediately following a data breach or potential compromise. Use a resource, such as haveibeenpwned.com, to determine if your information, such as an account password, has been revealed in a public data breach. Change exposed passwords for every account that uses it to protect against account compromise.
- Use the NJCCIC instructional guides to implement security and privacy controls for Android, Facebook, Google, Instagram, and Twitter , and configure similar settings on all other accounts. Tightening security and privacy settings will help to prevent account compromise and the unintended sharing of sensitive information and photos.
- Review and apply recommendations found in the NJCCIC post How Big is Your Footprint? The smaller your digital footprint, the less publicly-accessible information is available for threat actors to more effectively target you.
- Invest in security awareness training. Invest the time, money, and resources to ensure students, faculty, parents, guardians, and IT professionals understand risks, the latest cyber threats, and best practices. The NJCCIC is available by request to provide Outreach Presentations to inform users on current cyber threats and associated recommendations and best practices.
Securely Using Video Teleconferencing Platforms
Student and faculty engaged in remote learning environments will likely utilize a video-teleconferencing (VTC) platform for at least part of academic instruction. There have been several cybersecurity incidents involving VTC platforms since the start of the COVID-19 pandemic. VTC-hijacking – unauthorized individuals gaining access to a VTC meeting and displaying lewd, threatening, or otherwise inappropriate images or audio – has been one of the most prevalent threats facing those who use these platforms. Through security awareness and software updates, this threat is largely mitigated by applying the correct security and privacy settings on these platforms. Additionally, threat actors have impersonated various VTC platform via phishing emails claiming to contain a link to a virtual meeting. These links may result in the download of malware or being directed to phishing websites designed to steal user account credentials. Maintaining awareness of these various threats and tactics can greatly reduce victimization. Below are some general VTC cybersecurity best practices:
- Require a passcode for all meetings and securely share that passcode only with your invited guests. Once set, guests must enter the passcode in order to enter the meeting. This will prevent unauthorized individuals from joining a meeting.
- Use waiting rooms and require approval for external participants. Waiting rooms allow the meeting host to verify those attempting to gain access to the meeting. External participants are those with email addresses outside of the academic institution’s email domain.
- Do not share your meeting IDs. These IDs are unique to individual users and could be used to determine when a meeting is currently in progress.
- Do not reuse meeting IDs or passcodes. Using new IDs and passcodes for each meeting reduces the risk of an unauthorized individual obtaining information needed to gain access to a VTC session.
- Send links to meetings directly to individuals and do not publicly post meeting links. Publicly posting meeting links could allow unauthorized individuals to access your meeting, particularly when other security settings are not in place.
- Disable participant screen sharing or file sharing and disable or limit audio sharing. Disabling these features will prevent your meeting from being hijacked by others and allowing the sharing of inappropriate content.
- Lock meetings once everyone has joined. Locking meetings prevents unauthorized users from gaining entry while the meeting is in session.
- Avoid posting photos of your meetings. Posted photos could provide threat actors with the associated meeting ID and information on meeting participants.
- Disable the “Allow Removed Participants to Rejoin” option. If an unauthorized participant is identified and removed, disabling this option will prevent them from regaining access to the meeting using the same account.
- Do not use dial-in numbers for your meetings, where possible. Anyone with the dial-in number and meeting PIN can join the meeting, and the individual’s phone number identifier makes participant verification more difficult.
- Keep all remote learning/VTC platforms updated. Enhanced security and privacy features may be implemented.
- Enable multi-factor authentication (MFA) for all accounts that offer it. MFA will prevent account compromise resulting from an individual gaining access to or guessing a user’s password.
Platform-Specific Best Practices and Recommendations
Ensuring Internet Safety
Technology can be a great educational tool, but may expose students to various risks if protective measures are not implemented. Children are often introduced to electronic devices at younger ages, and many are more technology-savvy than their parents or guardians. Children, teens, and adolescents excessively flocked to social media for a way to connect with friends and family during the pandemic. In our “always-on” society, children are one of the most vulnerable user groups as they are often exposed to heavy media saturation and potentially harmful material. Remote learning will only widen this exposure with the increase in screen time. Parents/guardians should check devices provided by their academic institution(s) to ensure content filters/blocks are enabled and contact the IT department or academic administration for further assistance, if necessary. Regular audits should be conducted by the IT department to ensure access is only permitted to appropriate online educational materials, as well as to confirm that updates have been applied. Additionally, NJ academic institutions should provide both students and parents/guardians with the Responsible Use Policies (RUPs), also known as Acceptable Use Policies (AUPs), which outline the terms of use for school-issued devices and consequences for violations of these policies. Below are some risks associated with increased internet exposure that may impact children, and the resources parents, guardians, and teachers may use to assist them through these issues.
- Oversharing PII online. Sharing of personally identifying information (PII) can provide threat actors information necessary to engage in cyber-criminal behavior, identity theft schemes, or, in the case of children, online predation. Students are encouraged to be selective with the information they share on social media platforms, remote learning environments, and during video teleconferencing sessions. PII includes the following:
- Full name
- Age
- Physical and email addresses
- Phone number
- Social Security number
- Full birthdate
- Engaging in or being a victim of cyberbullying. Cyberbullying is a form of bullying that takes place over digital devices, such as smartphones, computers, and tablets. Cyberbullying can be conducted via text, on social media apps, instant messages, and in online gaming arenas. It includes sending, posting, or sharing negative, harmful, false, derogatory, or personal content about someone without their consent, causing embarrassment or humiliation. Many children attempt to conceal their experiences; therefore, it is important for teachers, parents, and guardians to be aware of warning signs that a child may be experiencing cyberbullying. It is important to have conversations with children and stay engaged. Some instances cross the line into unlawful or criminal behavior. For more information visit www.stopbullying.gov.
- Viewing or posting inappropriate content. Children can unintentionally encounter inappropriate material, such as sexually explicit content, or otherwise disturbing images or videos. Ensure content filters and security blocks are in-place to protect children from exposure. Likewise, posting inappropriate content is also a concern. It is important to review with children the types of inappropriate content, including:
- Hate speech
- Pranks
- Offensive language
- Threats of violence
- Underage drinking or drug use
- Explicit photographs of themselves or others
- There can be immediate and long-term consequences for posting inappropriate content online affecting children for years to come including:
- Damage to their reputations
- Punishment if a post breaks the academic institution’s rules or policies
- Charged with a crime if they are breaking a law
- Hinder acceptance to college, receiving a scholarship, or getting a job in the future
- Sextortion: Children may become victim of sextortion, or threatened to distribute private and sensitive material if not compliant with requests of sexual images, favors, or money. Sextortion schemes may also utilize ransomware, whereby the individual’s files are encrypted and the threat actor demands payment for the victim to regain access to their files.
- Beware of online predators. The National Center for Missing and Exploited Children (NCMEC) received almost double the number of online enticement reports and CyberTipline reports in the first half of 2020 compared to the same timeframe in 2019. The FBI also published a news release stating that school closings due to COVID-19 presented potential for increased risk of child exploitation. Online predators groom victims by building their trust, feigning common interests, or sympathizing with them, and eventually attempt to set up an in-person meeting to move forward with manipulation and seduction. Predators frequent the places children access such as social networks, chat rooms, blogs, message forums, etc. Some grooming techniques may be displayed as:
- Learn about the child’s interests - movies, music, hobbies
- Become their “friend” - listen and sympathize with their problems/issues
- Send gifts to get attention and affection
- Gradually build to sexual content through conversations, photos, and videos
- Evaluate which child to attempt to meet in person
Adults who discover any of the above indicators should contact local law enforcement, the NJ State Police Digital Technology Investigations Unit (DTIU), or FBI.
Additional internet safety resources to assist students, parents, guardians, and faculty
Secure Your Home Wi-Fi
To accommodate remote learning, students will use various devices that require an internet connection for their academic instruction. These devices will likely use a home wireless (Wi-Fi) network; however, the Wi-Fi router may not be set up securely. If a Wi-Fi network is left unsecured, a threat actor could potentially gain unauthorized access to the network and the devices connected to it. As a result, personal, financial, and otherwise sensitive data could be exposed, and their access may lead to other types of malicious activity. Below are some recommendations to help protect your network, data, and devices from unauthorized access and other malicious activity; additional details for implementing the recommendations, as well as steps to set up a Wi-Fi router, can be found in the NJCCIC Configuring & Securing a Home Wi-Fi Router Cybersecurity Guide.
- Change the router default username and password. Default router credentials are often publicly available and can be used to gain unauthorized access to your network.
- Change the network name (SSID). Default SSIDs may give away the router’s model, which could provide threat actors information necessary to obtain the router password (if using default credentials) or determine potential vulnerabilities that could be exploited.
- Enable WPA2 with AES (or WPA3, if available). Wi-Fi Protected Access versions 2 and 3 (WPA2/WPA3) are both recommended options for ensuring data on devices connected to the network is properly encrypted and secured.
- Update your router’s firmware. Unlike software that provides automatic updates or prompts users to install updates, Wi-Fi router firmware needs to be manually downloaded and installed. Without firmware updates, routers may contain known vulnerabilities or use outdated encryption that could compromise the security of the network.
- Create separate networks for devices. Creating separate Wi-Fi networks for groups of devices with similar purposes and/or sensitivity can help to prevent an entire network of devices from being compromised if a threat actor is able to gain unauthorized access to one device or network. For example, keep internet-of-things devices on one network and mobile devices on another.
- Place the router in the center of your home. This placement provides the best coverage for the devices in your home, while also making it less likely that the signal will be strong enough for someone outside your home to connect to your network.
The ABC’s of the NJCCIC Cybersecurity Best Practices
Account and device security
Backup data and keep multiple copies offline and offsite
Cyber hygiene
Data protection
Email security
Firewall protection
Gather threat intelligence
Hardening systems
Incident response
Join NJCCIC membership and other security mailing lists
Knowledge and information sharing
Lock screens and devices
Multi-factor authentication
Network security
Online presence and safety
Patches and updates
Question and report suspicious activity
Risk management
Simulation exercises and training
Third-party vendor management
Use strong, unique passwords
Virus and malware protection
Wireless security
X out of suspicious communications
Yield and think before clicking
Zero-tolerance for acceptable use