Introduction to Cybersecurity
Lesson 6 of 15

Lesson 6

Lesson 2.3 - Be Consistent: Making Cybersecurity a Daily Habit


In this lesson, you will…

  • Recognize how human error is a primary cybersecurity risk and understand how to mitigate these risks through self assessment practices.

  • Complete a self-assessment checklist.

INTRODUCTION

Every cybersecurity breach starts somewhere and busy educators can easily create vulnerabilities.

A rushed click. A reused password. A missed update.

While attackers use high-tech tools, the most common way in is still human error.

In fact, human error is the number 1 cause of cybersecurity breaches worldwide.

It’s usually not about being careless, it’s about being busy, distracted or simply trying to be helpful.

ACTIVITY READING

Why Self-Assessment Matters

Awareness matters because in busy schools, its so easy to make a mistake when you are juggling a million responsibilities.

Here is how human error shows up in schools:

  • Clicking on a link in a rush without checking the sender

  • Reusing the same password across email, grades and payroll systems

  • Skipping an update because you’re in the middle of a lesson

  • Sharing login info with a colleague

  • Connecting to public Wi-Fi during a conference and checking sensitive accounts

  • Posting photos of your classroom setup with a login screen in the background

Each of these seems small in the moment but they can open the door to much bigger problems.

But here's the good news: most of these mistakes are completely preventable and prevention starts with consistency.

In this short lesson, you’ll reflect on your own habits and take a simple, powerful step toward protecting your work, your students and your school by completing and reflecting on a cybersecurity self-assessment.

PAUSE TO PROCESS

Self Assessment Checklist

Take a few minutes to check in with your current cybersecurity habits.
When you are ready, click the button to begin the activity.

JOIN THE CONVERSATION

After completing your self assessment checklist, take a moment to reflect on your strengths and areas of opportunity by responding the following:

Which strong cybersecurity habits are you implementing regularly?

Which ones will require a little more intention?

How can human error contribute to a cyberattack?