- Marietta City Schools
- Information Security
Technology & Information Systems
Page Navigation
-
Information Security
To protect our network from various cybersecurity threats, the Office of Information Technology and Information Systems has implemented a number of measures that will help monitor, identify and remediate threats. Although the tools we have implemented are highly effective, our most effective tool to combat cyber threats is you....the user. By arming users with the knowledge needed to identify suspicious emails and activities, the threat of cyber attacks can be reduced exponentially. One way this is accomplished is through security awareness training.
Security awareness training is a proven educational approach for improving risky employee IT behaviors that can lead to security compromises. Through the efficient delivery of relevant information on subjects including information security, social engineering, malware, and industry-specific compliance topics, security awareness training increases employee resilience to cyber attacks at home, on the move, and at the office. Below is information on many of the aforementioned topics.

Terms & Definitions
-
Malware
Malware attacks are the most common type of cyberattack. Malware is defined as malicious software, including spyware, ransomware, viruses, and worms, which gets installed into the system when the user clicks a dangerous link or email. Once inside the system, malware can block access to critical components of the network, damage the system, and gather confidential information, among others.
To prevent malware attacks,
- Think twice before clicking on links or downloading anything
- Do not open email attachments or images from an unknown source
- Don't trust pop-up windows that ask you to download software
- Limit your file-sharing to people or sources you know
- Be mindful of websites that you visit. Make sure the sites are sites that you know and trust.
Video: Malware - Security Awareness
-
Phishing
Cybercriminals send malicious emails that seem to come from legitimate resources. The user is then tricked into clicking the malicious link in the email, leading to malware installation or disclosure of sensitive information like credit card details and login credentials. By some accounts, phishing attacks account for over 80% of reported cyber incidents.
To prevent a phishing attempt,
- Know what a phishing scam looks like
- Don't click on links in emails from sources you are not familiar with
- Don't share your personal or work information if requested via email. Instead, go to the site that requested the information and log in first
- Change your password regularly
- Report any suspicious email to IT
Video:
Identifying Fake Websites and Phishing Emails
Phishing - A game of Deception
Stay Safe from Phishing and Scams -
Spear Phishing
Spear phishing is a more sophisticated form of a phishing attack in which cybercriminals target only privileged users such as system administrators and C-suite executives.
To prevent spear phishing, see Phishing.
-
Social Engineering
Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems. Social engineering relies on manipulating individuals rather than hacking computer systems to penetrate a target's account.
To prevent social engineering attacks,
- Never provide your personal or work information to anyone that you do not know and trust
- Research the source of unsolicited messages
- Don't fall for messages of free offers or prizes
- Delete any request for personal information or passwords
- Make sure to secure your devices with a password or PIN
- Always be mindful of risks
Video: What is Social Engineering
-
Ransomware
Ransomware is a type of malware attack in which the attacker locks or encrypts the victim’s data and threatens to publish or blocks access to data unless a ransom is paid.
To prevent ransomware attacks,
- Think twice before clicking on links or downloading anything
- Do not open email attachments or images from an unknown source
- Don't trust pop-up windows that ask you to download software
- Limit your file-sharing to people or sources you know
- Be mindful of the websites that you visit. Make sure the sites are sites that you know and trust.
Video: What is Ransomware, How it Works and What You Can Do to Stay Protected
-
It is important that if you suspect that you have been the victim of any of the attacks listed above, you contact your local Technical Support Specialist or the Office of Technology and Information Systems immediately.