Settings
Language
Color Theme
Cybersecurity for teachers
For teachers, cybersecurity is about protecting student information, school systems, and your work account from scams, malware, and misuse. Many threats look like normal school communication, so small verification habits make a big difference.
Which of the following BEST describes cybersecurity for teachers?
Loading...
View Options Again
Avoiding technology during the school day
Fixing school computers and managing Wi-Fi networks
Protecting school accounts, student data, and systems from scams and malware
Only reporting issues after a major incident
Why teachers are targeted
Teachers use school systems and online platforms to communicate with students, families, and staff. If a teacher's account is compromised, attackers can access sensitive information or send believable phishing messages to the community.
Is the following statement True or False:
Teachers are targeted because their accounts are trusted and may provide access to sensitive student information.
Loading...
View Options Again
True
False
Where teacher-focused scams begin
Most scams aimed at teachers look routine. They arrive as updates from school administrators, timetable changes, shared school documents, or student requests.
Which of the following is a common way a teacher scam begins?
Loading...
View Options Again
A scheduled meeting reminder you expected
An email that appears to be from school administrators with an embedded document or link
A confirmed update inside the official school system
A face-to-face discussion with a parent
Familiar does not mean safe
School logos and staff names can all be copied. A message can look internal and still be malicious. Unexpected attachments or login requests should always trigger a quick verification check.
Is the following statement True or False:
If an email uses correct school branding and tone, it is safe to open the included attachment.
Loading...
View Options Again
True
False
Common teacher cyber traps
Attackers blend into normal teaching workflows. They rely on routine tasks and time pressure to reduce scrutiny.
Policy and compliance prompts
Fake messages may mimic policy updates, required training, or compliance reminders to encourage fast clicks.
Malicious attachments and shared links
Documents labeled as lesson plans, student forms, or reports may contain malware or lead to credential capture pages.
Account and access warnings
Phishing messages may claim your account will be locked or your password must be reset immediately to keep access.
Shared environments increase risk
Schools use shared networks, drives, and devices. One compromised account or infected device can affect other staff and leak student information.
Is the following statement True or False:
A single malicious attachment opened and executed by one staff member can impact other systems in the school.
Loading...
View Options Again
True
False
Keep devices updated
Security updates fix known security weaknesses. Applying security updates to school and personal devices used for teaching purposes helps to reduce risk.
Which message is most likely to be a scam attempt?
Loading...
View Options Again
An unexpected attachment from an unknown sender about a student issue that requires urgent action
A timetable change shown in the official portal
A routine message from a known colleague with no link
A meeting reminder you were expecting
Protecting students starts with small habits
Cybersecurity is not about slowing you down. It's about helping you to stay safe and confident when collaborating with students and colleagues. When something feels unexpected or urgent, take a moment to confirm before clicking. A short pause can prevent a major incident.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
I acknowledge
[89, "I acknowledge", "I acknowledge"],
Thank you for providing an acknowledgement
[90, "Thank you for providing an acknowledgement", "Thank you for providing an acknowledgement"],
Cybersecurity-For-Teachers
[91, "Cybersecurity-For-Teachers", "Cybersecurity-For-Teachers"],
Cybersecurity for teachers
[92, "Cybersecurity for teachers", "Cybersecurity for teachers"],
For teachers, cybersecurity is about protecting student information, school systems, and your work account from scams, malware, and misuse. Many threats look like normal school communication, so small verification habits make a big difference.
[93, "For teachers, cybersecurity is about protecting student information, school systems, and your work account from scams, malware, and misuse. Many threats look like normal school communication, so small verification habits make a big difference.", "For teachers, cybersecurity is about protecting student information, school systems, and your work account from scams, malware, and misuse. Many threats look like normal school communication, so small verification habits make a big difference."],
Which of the following BEST describes cybersecurity for teachers?
[94, "Which of the following BEST describes cybersecurity for teachers?", "Which of the following BEST describes cybersecurity for teachers?"],
Protecting school accounts, student data, and systems from scams and malware
[95, "Protecting school accounts, student data, and systems from scams and malware", "Protecting school accounts, student data, and systems from scams and malware"],
Fixing school computers and managing Wi-Fi networks
[96, "Fixing school computers and managing Wi-Fi networks", "Fixing school computers and managing Wi-Fi networks"],
Avoiding technology during the school day
[97, "Avoiding technology during the school day", "Avoiding technology during the school day"],
Only reporting issues after a major incident
[98, "Only reporting issues after a major incident", "Only reporting issues after a major incident"],
For teachers, cybersecurity focuses on protecting student information and school systems by recognizing and avoiding common cyber threats.
[99, "For teachers, cybersecurity focuses on protecting student information and school systems by recognizing and avoiding common cyber threats.", "For teachers, cybersecurity focuses on protecting student information and school systems by recognizing and avoiding common cyber threats."],
Why teachers are targeted
[100, "Why teachers are targeted", "Why teachers are targeted"],
Teachers use school systems and online platforms to communicate with students, families, and staff. If a teacher's account is compromised, attackers can access sensitive information or send believable phishing messages to the community.
[101, "Teachers use school systems and online platforms to communicate with students, families, and staff. If a teacher's account is compromised, attackers can access sensitive information or send believable phishing messages to the community.", "Teachers use school systems and online platforms to communicate with students, families, and staff. If a teacher's account is compromised, attackers can access sensitive information or send believable phishing messages to the community."],
Teachers are targeted because their accounts are trusted and may provide access to sensitive student information.
[102, "Teachers are targeted because their accounts are trusted and may provide access to sensitive student information.", "Teachers are targeted because their accounts are trusted and may provide access to sensitive student information."],
Compromised teacher accounts can be used to access data or send convincing phishing messages to colleagues, students, and parents.
[103, "Compromised teacher accounts can be used to access data or send convincing phishing messages to colleagues, students, and parents. ", "Compromised teacher accounts can be used to access data or send convincing phishing messages to colleagues, students, and parents. "],
Where teacher-focused scams begin
[104, "Where teacher-focused scams begin", "Where teacher-focused scams begin"],
Most scams aimed at teachers look routine. They arrive as updates from school administrators, timetable changes, shared school documents, or student requests.
[105, "Most scams aimed at teachers look routine. They arrive as updates from school administrators, timetable changes, shared school documents, or student requests.", "Most scams aimed at teachers look routine. They arrive as updates from school administrators, timetable changes, shared school documents, or student requests."],
Which of the following is a common way a teacher scam begins?
[106, "Which of the following is a common way a teacher scam begins? ", "Which of the following is a common way a teacher scam begins? "],
An email that appears to be from school administrators with an embedded document or link
[107, "An email that appears to be from school administrators with an embedded document or link ", "An email that appears to be from school administrators with an embedded document or link "],
A face-to-face discussion with a parent
[108, "A face-to-face discussion with a parent", "A face-to-face discussion with a parent"],
A confirmed update inside the official school system
[109, "A confirmed update inside the official school system", "A confirmed update inside the official school system"],
A scheduled meeting reminder you expected
[110, "A scheduled meeting reminder you expected ", "A scheduled meeting reminder you expected "],
Cybercriminals copy routine school communication because it is more likely to be trusted without question.
[111, "Cybercriminals copy routine school communication because it is more likely to be trusted without question.", "Cybercriminals copy routine school communication because it is more likely to be trusted without question."],
Familiar does not mean safe
[112, "Familiar does not mean safe", "Familiar does not mean safe"],
School logos and staff names can all be copied. A message can look internal and still be malicious. Unexpected attachments or login requests should always trigger a quick verification check.
[113, "School logos and staff names can all be copied. A message can look internal and still be malicious. Unexpected attachments or login requests should always trigger a quick verification check.", "School logos and staff names can all be copied. A message can look internal and still be malicious. Unexpected attachments or login requests should always trigger a quick verification check."],
If an email uses correct school branding and tone, it is safe to open the included attachment.
[114, "If an email uses correct school branding and tone, it is safe to open the included attachment.", "If an email uses correct school branding and tone, it is safe to open the included attachment."],
Branding and tone can be replicated. If an email is unexpected, the sender's address is unfamiliar, or asks you to perform an action such as open an attachment, the sender should always be verified through known safe communication channels.
[115, "Branding and tone can be replicated. If an email is unexpected, the sender's address is unfamiliar, or asks you to perform an action such as open an attachment, the sender should always be verified through known safe communication channels.", "Branding and tone can be replicated. If an email is unexpected, the sender's address is unfamiliar, or asks you to perform an action such as open an attachment, the sender should always be verified through known safe communication channels."],
Common teacher cyber traps
[116, "Common teacher cyber traps", "Common teacher cyber traps"],
Attackers blend into normal teaching workflows. They rely on routine tasks and time pressure to reduce scrutiny.
[117, "Attackers blend into normal teaching workflows. They rely on routine tasks and time pressure to reduce scrutiny.", "Attackers blend into normal teaching workflows. They rely on routine tasks and time pressure to reduce scrutiny."],
Policy and compliance prompts
[118, "Policy and compliance prompts", "Policy and compliance prompts"],
Fake messages may mimic policy updates, required training, or compliance reminders to encourage fast clicks.
[119, "Fake messages may mimic policy updates, required training, or compliance reminders to encourage fast clicks.", "Fake messages may mimic policy updates, required training, or compliance reminders to encourage fast clicks."],
Malicious attachments and shared links
[120, "Malicious attachments and shared links", "Malicious attachments and shared links"],
Documents labeled as lesson plans, student forms, or reports may contain malware or lead to credential capture pages.
[121, "Documents labeled as lesson plans, student forms, or reports may contain malware or lead to credential capture pages.", "Documents labeled as lesson plans, student forms, or reports may contain malware or lead to credential capture pages."],
Account and access warnings
[122, "Account and access warnings ", "Account and access warnings "],
Phishing messages may claim your account will be locked or your password must be reset immediately to keep access.
[123, "Phishing messages may claim your account will be locked or your password must be reset immediately to keep access.", "Phishing messages may claim your account will be locked or your password must be reset immediately to keep access."],
Shared environments increase risk
[124, "Shared environments increase risk", "Shared environments increase risk"],
Schools use shared networks, drives, and devices. One compromised account or infected device can affect other staff and leak student information.
[125, "Schools use shared networks, drives, and devices. One compromised account or infected device can affect other staff and leak student information.", "Schools use shared networks, drives, and devices. One compromised account or infected device can affect other staff and leak student information."],
A single malicious attachment opened and executed by one staff member can impact other systems in the school.
[126, "A single malicious attachment opened and executed by one staff member can impact other systems in the school. ", "A single malicious attachment opened and executed by one staff member can impact other systems in the school. "],
Cybercriminals will commonly use a single compromised computer or account to laterally move around networks and then compromise other users or steal sensitive information.
[127, "Cybercriminals will commonly use a single compromised computer or account to laterally move around networks and then compromise other users or steal sensitive information.", "Cybercriminals will commonly use a single compromised computer or account to laterally move around networks and then compromise other users or steal sensitive information."],
Keep devices updated
[128, "Keep devices updated", "Keep devices updated"],
Security updates fix known security weaknesses. Applying security updates to school and personal devices used for teaching purposes helps to reduce risk.
[129, "Security updates fix known security weaknesses. Applying security updates to school and personal devices used for teaching purposes helps to reduce risk.", "Security updates fix known security weaknesses. Applying security updates to school and personal devices used for teaching purposes helps to reduce risk."],
Which message is most likely to be a scam attempt?
[130, "Which message is most likely to be a scam attempt? ", "Which message is most likely to be a scam attempt? "],
An unexpected attachment from an unknown sender about a student issue that requires urgent action
[131, "An unexpected attachment from an unknown sender about a student issue that requires urgent action ", "An unexpected attachment from an unknown sender about a student issue that requires urgent action "],
A meeting reminder you were expecting
[132, "A meeting reminder you were expecting ", "A meeting reminder you were expecting "],
A timetable change shown in the official portal
[133, "A timetable change shown in the official portal ", "A timetable change shown in the official portal "],
A routine message from a known colleague with no link
[134, "A routine message from a known colleague with no link", "A routine message from a known colleague with no link"],
Sensitive topics and urgency are common tactics used to push teachers into opening malicious files.
[135, "Sensitive topics and urgency are common tactics used to push teachers into opening malicious files.", "Sensitive topics and urgency are common tactics used to push teachers into opening malicious files."],
Protecting students starts with small habits
[136, "Protecting students starts with small habits ", "Protecting students starts with small habits "],
Cybersecurity is not about slowing you down. It's about helping you to stay safe and confident when collaborating with students and colleagues. When something feels unexpected or urgent, take a moment to confirm before clicking. A short pause can prevent a major incident.
[137, "Cybersecurity is not about slowing you down. It's about helping you to stay safe and confident when collaborating with students and colleagues. When something feels unexpected or urgent, take a moment to confirm before clicking. A short pause can prevent a major incident.", "Cybersecurity is not about slowing you down. It's about helping you to stay safe and confident when collaborating with students and colleagues. When something feels unexpected or urgent, take a moment to confirm before clicking. A short pause can prevent a major incident."],
[138, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.