In this lesson, you will…
Recognize how human error is a primary cybersecurity risk and understand how to mitigate these risks through self assessment practices.
Complete a self-assessment checklist.
INTRODUCTION
Every cybersecurity breach starts somewhere and busy educators can easily create vulnerabilities.
A rushed click. A reused password. A missed update.
While attackers use high-tech tools, the most common way in is still human error.
In fact, human error is the number 1 cause of cybersecurity breaches worldwide.
It’s usually not about being careless, it’s about being busy, distracted or simply trying to be helpful.
ACTIVITY READING
Why Self-Assessment Matters
Awareness matters because in busy schools, its so easy to make a mistake when you are juggling a million responsibilities.
Here is how human error shows up in schools:
Clicking on a link in a rush without checking the sender
Reusing the same password across email, grades and payroll systems
Skipping an update because you’re in the middle of a lesson
Sharing login info with a colleague
Connecting to public Wi-Fi during a conference and checking sensitive accounts
Posting photos of your classroom setup with a login screen in the background
Each of these seems small in the moment but they can open the door to much bigger problems.
But here's the good news: most of these mistakes are completely preventable and prevention starts with consistency.
In this short lesson, you’ll reflect on your own habits and take a simple, powerful step toward protecting your work, your students and your school by completing and reflecting on a cybersecurity self-assessment.
PAUSE TO PROCESS
Self Assessment Checklist
Take a few minutes to check in with your current cybersecurity habits.
When you are ready, click the button to begin the activity.
JOIN THE CONVERSATION
After completing your self assessment checklist, take a moment to reflect on your strengths and areas of opportunity by responding the following:
Which strong cybersecurity habits are you implementing regularly?
Which ones will require a little more intention?
How can human error contribute to a cyberattack?