Cybersecurity
On this page:
OVERVIEW | COMMON THREATS | PHISHING | PASSWORDS | IDENTITY PROTECTION | SUPPORT TOOLS
For data privacy concerns, some resources may require you to sign in to Google Chrome with your MPS email in order to see them.
> Overview
Protect sensitive information and understand how to prevent digital threats.
> Common Threats
Most cyberattacks try to trick you into:
-
Clicking a malware link or downloading an attachment embedded with malware.
-
Sending money to an account owned by a threat actor.
-
Revealing personal details like answers to security questions, your username, password, or other account information.
Click the (+) plus button to learn more about common threats to cybersecurity.
> Phishing
Phishing (Video)
This 4 minute video helps you to identify phishing and learn best practices for how to be part of our preventative solutions against phishing schemes.
Report Phishing in Outlook (Video)
If you believe you’ve received a phishing email, report the email using the “Report Phish” button in Outlook.
7 Signs of Phishing
There are 7 signs which can help you tell if something is real or a phishing attempt.
EMAIL SUBJECT LINES
Subject lines that invoke panic are often a sign of a phishing attempt.
SENDER INFORMATION
Real businesses have their own email service, so they won’t need to use providers like yahoo, hotmail, gmail, as so on.
If the email address contains random numbers, this is also a sign that the email address is fake.
Phone numbers beginning with 800 or 888 are from official businesses.
GENERIC GREETING
Most threat actors won’t know your name, so they use generic greetings like “Dear Customer” or “Good morning coworker”.
POORLY WRITTEN
Professionals take the time to proofread their communications.
Typos, and poor grammar are common indications of a phishing attempt.
URGENT CALL-TO-ACTION
Urgent calls-to-action include
warnings of accounts being
closed, or the possibility of you losing access to something.
These calls-to-action are designed to cause stress, so that you act quickly.
INFORMATION REQUESTS
Threat actors will request personal information like usernames, passwords, birthdays, addresses, and so on.
LINKS/ATTACHMENTS
Malware, or malicious software, is frequently disguised as links, files or email attachments.
Never click on a suspicious link or email attachment.
> Passwords
At MPS:
- students should speak with their building's Password Resetter to request a new password.
- employees can follow these instructions to create a new password.
Passphrases (Video)
Password Requirements:
MPS passwords need to follow certain requirements for security purposes.
Your password must:
-
Be a minimum of 13 characters
-
Contain at least one capital/uppercase letter
-
Contain at least one number
Your password cannot:
-
Contain your name or MPS username
-
Be any of your 10 previously used passwords
> Identity Protection
> Cybersecurity Support Tools
Sort by Category
- All
- ALL STAFF
- Academic Initiatives
- Adult Education
- CENTRAL OFFICE
- CLERICAL
- Classroom Technology
- Clever
- Climate and Culture
- Compliance
- Cybersecurity
- Early Childhood
- Engagement, Marketing, and Communication
- Finance
- GENERAL PUBLIC
- GENERAL PUBLIC
- Health
- Human Resources (HR)
- LEADERS
- Leadership
- MTSS
- NON-SCHOOL STAFF
- New Employee Orientation (NEO)
- Onboarding
- Operations
- Promethean
- Research, Accountability, and Equity (REA)
- STUDENTS/FAMILIES
- STUDENTS/FAMILIES
- SUPPORT STAFF
- Safety
- Self-Growth
- Special Education
- TEACHERS
- Teacher Relicensure
- assessment
- central office
- literacy
- math
- multilingual
- non-school site
- special education
Search by Keyword
Acrobat Pro DC is a tool you can use to digitally fill out/complete, sign, and request signatures for PDFs. This is a great time saver, as this means no more printing, signing documents by hand, scanning, and forwarding documents.
- creativity and design
- curriculum support
- cybersecurity
- engagement and marketing
- finance
- hybrid and remote work
- technology integration
- workplace professionalism
A computer is a device that can store, share, and modify data. At MPS, we use:
- Windows/PC
- MAC
- Chromebook
- iPad
- curriculum support
- cybersecurity
- leadership
- professional development (PD)
- substitute teaching
- technology integration
- workplace professionalism
There are certain feature that are only available on MAC computers. Take a look at our MPS Device Comparison resource to learn more.
Windows/PC are the most versatile device for MPS employees.
- curriculum support
- cybersecurity
- engagement and marketing
- leadership
- professional development (PD)
- technology integration
- workplace professionalism
Windows/PC computers are the most versatile device. You can accomplish almost any essential task with a Windows/PC computer. A majority of our devices are Windows/PC computers.
- curriculum support
- cybersecurity
- finance
- leadership
- professional development (PD)
- technology integration
- workplace professionalism
- Cybersecurity
- Leadership
- Self-Growth
Test your ability to identify phishing attacks in this micro training course.
- cybersecurity
- ⚡Micro
- Cybersecurity
- Human Resources (HR)
- Leadership
- Self-Growth
Identify phishing attempts and learn appropriate responses to cyberattacks.
- cybersecurity
- ⚡Micro
- Cybersecurity
- Finance
- Human Resources (HR)
- Leadership
- Self-Growth
After completing this course, you'll be able to:
- Describe the dangers of social engineering attacks.
- Identify social engineering attacks.
- Protect yourself and others from social engineering attacks.
- Report social engineering attacks.
- 30-45 mins
- cybersecurity
The eHelpDesk is a website where MPS employees can submit eTickets to:
- request support with technology and equipment
- report broken technology
- cybersecurity
- hybrid and remote work
- leadership
- workplace professionalism
MPS employees use Outlook for email. MPS students use Gmail for email.
- cybersecurity
- hybrid and remote work
- leadership
- substitute teaching
- workplace professionalism
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- GENERAL PUBLIC
- LEADERS
- NON-SCHOOL STAFF
- STUDENTS/FAMILIES
- SUPPORT STAFF
- TEACHERS
Email security refers to steps you can take to protect yourself from email attacks by hackers and scammers (threat actors).
- cybersecurity
- leadership
- substitute teaching
- technology integration
- central office
Google Chrome is the web browser recommended by MPS.
- curriculum support
- cybersecurity
- technology integration
The online Google Classroom tool is MPS' Learning Management System.
- curriculum support
- cybersecurity
- scheduling
- substitute teaching
- technology integration
- MTSS
- STUDENTS/FAMILIES
- central office
- non-school site
Google Drive is an online tool used to store and share files. In order to use Google Drive, staff and students must login with their MPS email address and password.
- curriculum support
- cybersecurity
- engagement and marketing
- hybrid and remote work
- leadership
- professional development (PD)
- technology integration
- workplace professionalism
Google Meet is an online tool used for video meetings from a smartphone, computer, tablet, or iPad. In order to join a Google Meet, staff and students must login with their MPS email address and password.
- cybersecurity
- hybrid and remote work
- leadership
- professional development (PD)
- scheduling
- technology integration
- workplace professionalism
- CENTRAL OFFICE
- LEADERS
- NON-SCHOOL STAFF
- SUPPORT STAFF
Remote work resources refers to various resources available to staff to help them work successfully from locations outside of the school or office building.
- curriculum support
- cybersecurity
- leadership
- planning
- technology integration
- workplace professionalism
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- GENERAL PUBLIC
- LEADERS
- NON-SCHOOL STAFF
- STUDENTS/FAMILIES
- SUPPORT STAFF
- TEACHERS
Identity protection refers to steps you can take to protect yourself from identity theft.
- cybersecurity
- leadership
Take a look at our Device Comparison resource to learn what functionality is available on employee iPads. Use Self-Service to install approved apps and software on your iPad, without needing to contact IT Services.
- cybersecurity
- professional development (PD)
- technology integration
iPads are available to students in grades PreK-2, and as identified in a student's IEP. Students in grades 3-12 use Chromebooks.
- curriculum support
- cybersecurity
- substitute teaching
- technology integration
The Microsoft Authenticator smartphone app helps you sign in to your accounts when you're using multifactor authentication (MFA).
- curriculum support
- cybersecurity
- hybrid and remote work
- leadership
- substitute teaching
- technology integration
- central office
- non-school site
- special education
Microsoft Teams is a online chat tool which allows users to work and collaborate together.
- cybersecurity
- engagement and marketing
- leadership
- professional development (PD)
- scheduling
- technology integration
- workplace professionalism
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- LEADERS
- NON-SCHOOL STAFF
- SUPPORT STAFF
- TEACHERS
Use the password reset website to change your MPS account password.
- cybersecurity
- leadership
- workplace professionalism
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- GENERAL PUBLIC
- LEADERS
- NON-SCHOOL STAFF
- STUDENTS/FAMILIES
- SUPPORT STAFF
- TEACHERS
Password security are best practices in creating a strong password that is difficult for others to guess/discover.
- cybersecurity
- technology integration
- workplace professionalism
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- GENERAL PUBLIC
- LEADERS
- NON-SCHOOL STAFF
- STUDENTS/FAMILIES
- SUPPORT STAFF
- TEACHERS
Phishing and Social Engineering are two common ways threat actors try to gain access to your personal information or your digital accounts.
- cybersecurity
- leadership
Learn more about federal student privacy laws and students' rights.
- curriculum support
- cybersecurity
- students/families
- technology integration
- central office
- non-school site
- special education
Self Service is a tool used on iPads and MAC computers. Self Service allows you to install apps and programs on your device by yourself; without having to contact IT Services.
- creativity and design
- curriculum support
- cybersecurity
- leadership
- technology integration
- ALL STAFF
- CENTRAL OFFICE
- CLERICAL
- GENERAL PUBLIC
- LEADERS
- NON-SCHOOL STAFF
- STUDENTS/FAMILIES
- SUPPORT STAFF
- TEACHERS
Tax scam prevention refers to steps people can take to avoid falling for scams related to paying taxes.
- cybersecurity
- engagement and marketing
- leadership
- physical safety
- technology integration
- workplace professionalism
- central office
- non-school site
Virtual Private Networks (VPNs) are software that allow you to log into the MPS. network when you are offsite.
VPN is only required if you're an employee who works remotely and requires access to SAP.
- cybersecurity
- finance
- hybrid and remote work