Security and Safe Computing
Information on IT security including the ability to report a security incident and how to protect yourself.
Lock Your Computer Screen
Why should you lock your screen when you're away?
This helps prevent others from viewing or using your device when you're not around. Set up your computer and mobile devices to automatically go to screensaver after a certain amount of inactivity. In addition, manually lock when leaving your device unattended.
All computers (Mac, PC and Linux) are susceptible to viruses, spyware, and malware. That is why it is important to protect your computer from potential viruses by having an antivirus program installed on your personal computer. All Buckley-owned computers have an antivirus agent installed on them.
Backup Data Protection
Backup protection is needed on all servers and data systems due to human error, illegitimate deletion, programmatic errors, phishing, malicious insiders, malware and ransomware, and hackers to name a few.
Buckley uses cloud-based backup services to help protect our use of Google Suite (Drive, Calendar, and Contacts), Microsoft email, and networking and systems equipment.
Portable devices such as laptops, tablets, and USB storage are most at risk for being misplaced or stolen. If a device is lost or stolen, encryption prevents unauthorized users from accessing data stored locally on the device. Without encryption, unauthorized users can use various techniques to bypass the accounts and permissions in order to access the local drive contents.
In order to meet our legal obligations and our responsibility to protect the privacy of those we serve, The Buckley School requires full disk encryption to be implemented on all school owned mobile computing devices (i.e. laptops, tablets, USB storage). The best way to avoid theft or loss of sensitive data is to keep it in a secure file storage offering such as department shared drives, where it's physically secured and regularly backed up. Then, you can easily access the information remotely from your mobile computer. However, encryption is our safety net for new files, temporary (cached) files, and other information that is stored on a mobile device. The Buckley School utilizes FileVault2 encryption for macOS mobile systems, and Microsoft BitLocker for Microsoft Windows mobile systems.
This service provides a simplified administrative interface for managing and monitoring FileVault2 encryption on macOS systems. It also offers enhanced protection against data theft and data exposure for macOS systems that are lost or stolen.
Microsoft Bitlocker is a full encryption feature included with Microsoft Windows versions that is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.
A firewall filters incoming Internet traffic while allowing you (and those behind the firewall) to communicate with the Internet.
Local Administrator Rights
Users are not granted local administrator rights on school-owned devices.
Why restrict local administrator rights?
Local admin rights give the user too much power. Endpoints are where many of the greatest risks to enterprise security lie, and giving users control over those endpoints only opens networks to more risk.
Malware is around every corner. Regular Web browsing and email phishing put workstations at constant risk. If users have local admin rights, the risk is even greater because they can veto IT's security measures.
Multi-factor authentication is when a user must provide two or more pieces of evidence to verify their identity to gain access to an app or digital resource. Multi-factor authentication (MFA) is used to protect against hackers by ensuring that digital users are who they say they are.
Google Workplace: Setup 2-Step Verification on Your Buckley Google Account
Microsoft Office 365: Setup MFA on Your Buckley Microsoft Account
KnowBe4 is our security awareness training tool. It helps us create a “human firewall” to protect us against malicious emails. This program consists of both a training campaign and simulated phishing attacks. It provides our users with a Phish Alert Button to report phish emails.
The Phishing Alert Button allows you to report a potential phishing email via your Outlook desktop client, Outlook web client or Outlook mobile client. This will empower the Information Technology department to review the email and take immediate action. We ask you to report all phishing emails using the Phishing Alert Button.
Simulated Phishing Campaign
Employees receive simulated phishing emails on an ongoing basis. These tests provide us with insight and analytics, and help us determine further training initiatives.
If our simulated phishing campaign determines that someone requires further training, an employee will automatically be enrolled in remedial training.
Our anti-spam service provides protection from spam and phishing emails sent to Buckley email addresses.
It helps quarantine emails and decrease phishing attempts.
Buckley IT is required by law to implement content filtering and monitoring. We meet this requirement by installing a dedicated content filtering device that sits on our network and evaluates all requests for web pages. It protects against access to visual depictions that are obscene, pornography-related, or harmful to minors.
While we perform content filtering that blocks inappropriate content on all Buckley networks, these will never be sufficient to completely protect students from inappropriate content. Faculty must continue to monitor student activity with old-fashion shoulder surfing and watch for signs that students have found a method to bypass filters.
Additional categories are blocked on student and guest networks. Some of these include:
Chat, Gambling, Games, Instant Messaging, Social Networking, and Video Sharing
Request to Unblock a Page or Category
When blocked, users are presented with an option to submit a request for a page to be unblocked. Buckley IT will verify with faculty or administration before unblocking a page or category.
For a complete list of blocked categories for All or for student networks, please contact Buckley IT.
YouTube is filtered on all Buckley networks. Faculty and students must SIGN IN with their Buckley email account to gain access to all YouTube content/videos. Otherwise, some videos will not be available when onsite.
Approving a Video
Once signed in, faculty may approve (whitelist) a video to make it available for Buckley students when onsite. Faculty may do so by clicking on the Approve button (located under the video). This feature is available for faculty only, and faculty need to be signed in and onsite.