Skip To Main Content

Select a School

Cybersecurity

On this page:

OVERVIEW | COMMON THREATS | PHISHING | PASSWORDS | IDENTITY PROTECTION | SUPPORT TOOLS

For data privacy concerns, some resources may require you to sign in to Google Chrome with your MPS email in order to see them.

 

binoculars > Overview  

Protect sensitive information and understand how to prevent digital threats.

> Common Threats

Most cyberattacks try to trick you into:

  1. Clicking a malware link or downloading an attachment embedded with malware.

  2. Sending money to an account owned by a threat actor.

  3. Revealing personal details like answers to security questions, your username, password, or other account information.

 

Click the (+) plus button to learn more about common threats to cybersecurity.

> Phishing

Phishing (Video)

This 4 minute video helps you to identify phishing and learn best practices for how to be part of our preventative solutions against phishing schemes.

Report Phishing in Outlook (Video)

If you believe you’ve received a phishing email, report the email using the “Report Phish” button in Outlook.

7 Signs of Phishing

There are 7 signs which can help you tell if something is real or a phishing attempt. 

EMAIL SUBJECT LINES

A magnifying glass over a rectangular shape. Inside is the word “FROM”.

Subject lines that invoke panic are often a sign of a phishing attempt.

SENDER INFORMATION

The “@” symbol.

Real businesses have their own email service, so they won’t need to use providers like yahoo, hotmail, gmail, as so on.

If the email address contains random numbers, this is also a sign that the email address is fake.

Phone numbers beginning with 800 or 888 are from official businesses.

GENERIC GREETING

A blue, waving hand.

Most threat actors won’t know your name, so they use generic greetings like “Dear Customer” or “Good morning coworker”.

POORLY WRITTEN

“abc” in lowercase letters, underlined with a red squiggly line indicating a misspelling.

Professionals take the time to proofread their communications.

Typos, and poor grammar are common indications of a phishing attempt.

URGENT CALL-TO-ACTION

Red police siren.

Urgent calls-to-action include
warnings of accounts being
closed, or the possibility of you losing access to something.

These calls-to-action are designed to cause stress, so that you act quickly.

INFORMATION REQUESTS

A speech bubble. Inside there’s a circled “i” (similar to an information symbol) and a question mark.

Threat actors will request personal information like usernames, passwords, birthdays, addresses, and so on.

LINKS/ATTACHMENTS

Red sticky note with a paperclip. There’s a black skull and crossbones on the red stick note.

Malware, or malicious software, is frequently disguised as links, files or email attachments.

Never click on a suspicious link or email attachment.

> Passwords

At MPS:

  • students should speak with their building's Password Resetter to request a new password.
  • employees can follow these instructions to create a new password.

Passphrases (Video)

Password Requirements:

MPS passwords need to follow certain requirements for security purposes.

Your password must:
  • Be a minimum of 13 characters

  • Contain at least one capital/uppercase letter

  • Contain at least one number

Your password cannot:
  • Contain your name or MPS username

  • Be any of your 10 previously used passwords


Employee Password Reset

> Identity Protection


 

Acrobat Pro DC: Fill & Sign PDFs
Updated

Acrobat Pro DC is a tool you can use to digitally fill out/complete, sign, and request signatures for PDFs. This is a great time saver, as this means no more printing, signing documents by hand, scanning, and forwarding documents.

  • creativity and design
  • curriculum support
  • cybersecurity
  • engagement and marketing
  • finance
  • hybrid and remote work
  • technology integration
  • workplace professionalism
Computers
Updated

A computer is a device that can store, share, and modify data. At MPS, we use:

  • Windows/PC
  • MAC
  • Chromebook
  • iPad

LEARN MORE

  • curriculum support
  • cybersecurity
  • leadership
  • professional development (PD)
  • substitute teaching
  • technology integration
  • workplace professionalism
Computers: MAC
Updated

There are certain feature that are only available on MAC computers. Take a look at our MPS Device Comparison resource to learn more.

Windows/PC are the most versatile device for MPS employees.

  • curriculum support
  • cybersecurity
  • engagement and marketing
  • leadership
  • professional development (PD)
  • technology integration
  • workplace professionalism
Computers: Windows/PC
Updated

Windows/PC computers are the most versatile device. You can accomplish almost any essential task with a Windows/PC computer. A majority of our devices are Windows/PC computers.

LEARN MORE

  • curriculum support
  • cybersecurity
  • finance
  • leadership
  • professional development (PD)
  • technology integration
  • workplace professionalism
Cybersecurity: Catch the Phish
  • Cybersecurity
  • Leadership
  • Self-Growth
Updated

Test your ability to identify phishing attacks in this micro training course.

  • cybersecurity
  • ⚡Micro
Cybersecurity: Phishing Awareness
  • Cybersecurity
  • Human Resources (HR)
  • Leadership
  • Self-Growth
Updated

Identify phishing attempts and learn appropriate responses to cyberattacks.

  • cybersecurity
  • ⚡Micro
Cybersecurity: Social Engineering
  • Cybersecurity
  • Finance
  • Human Resources (HR)
  • Leadership
  • Self-Growth
Updated

After completing this course, you'll be able to:

  • Describe the dangers of social engineering attacks.
  • Identify social engineering attacks.
  • Protect yourself and others from social engineering attacks.
  • Report social engineering attacks.
  • 30-45 mins
  • cybersecurity
eHelpDesk
Updated

The eHelpDesk is a website where MPS employees can submit eTickets to:

  1. request support with technology and equipment
  2. report broken technology 

GO TO EHELPDESK

  • cybersecurity
  • hybrid and remote work
  • leadership
  • workplace professionalism
Updated

MPS employees use Outlook for email. MPS students use Gmail for email.

LEARN MORE ABOUT OUTLOOK

  • cybersecurity
  • hybrid and remote work
  • leadership
  • substitute teaching
  • workplace professionalism
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • GENERAL PUBLIC
  • LEADERS
  • NON-SCHOOL STAFF
  • STUDENTS/FAMILIES
  • SUPPORT STAFF
  • TEACHERS
Updated

Email security refers to steps you can take to protect yourself from email attacks by hackers and scammers (threat actors).

  • cybersecurity
  • leadership
  • substitute teaching
  • technology integration
Google chrome web browser.
  • Google
  • central office
Updated

Google Chrome is the web browser recommended by MPS.

  • curriculum support
  • cybersecurity
  • technology integration
Google Drive
  • Google
  • MTSS
  • STUDENTS/FAMILIES
  • central office
  • non-school site
Updated

Google Drive is an online tool used to store and share files. In order to use Google Drive, staff and students must login with their MPS email address and password.


GO TO GOOGLE DRIVE

  • curriculum support
  • cybersecurity
  • engagement and marketing
  • hybrid and remote work
  • leadership
  • professional development (PD)
  • technology integration
  • workplace professionalism
Google Meet
Updated

Google Meet is an online tool used for video meetings from a smartphone, computer, tablet, or iPad. In order to join a Google Meet, staff and students must login with their MPS email address and password.

LEARN MORE

  • cybersecurity
  • hybrid and remote work
  • leadership
  • professional development (PD)
  • scheduling
  • technology integration
  • workplace professionalism
Hybrid and Remote Work Resources for Staff
  • CENTRAL OFFICE
  • LEADERS
  • NON-SCHOOL STAFF
  • SUPPORT STAFF
Updated

Remote work resources refers to various resources available to staff to help them work successfully from locations outside of the school or office building.

  • curriculum support
  • cybersecurity
  • leadership
  • planning
  • technology integration
  • workplace professionalism
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • GENERAL PUBLIC
  • LEADERS
  • NON-SCHOOL STAFF
  • STUDENTS/FAMILIES
  • SUPPORT STAFF
  • TEACHERS
Updated

Identity protection refers to steps you can take to protect yourself from identity theft.

  • cybersecurity
  • leadership
iPads for Employees
Updated

Take a look at our Device Comparison resource to learn what functionality is available on employee iPads. Use Self-Service to install approved apps and software on your iPad, without needing to contact IT Services.

  • cybersecurity
  • professional development (PD)
  • technology integration
Microsoft Authenticator App
Updated

The Microsoft Authenticator smartphone app helps you sign in to your accounts when you're using multifactor authentication (MFA).

LEARN MORE

  • curriculum support
  • cybersecurity
  • hybrid and remote work
  • leadership
  • substitute teaching
  • technology integration
Microsoft Teams Logo
  • central office
  • non-school site
  • special education
Updated

Microsoft Teams is a online chat tool which allows users to work and collaborate together.

OPEN TEAMS IN WEB BROWSER

  • cybersecurity
  • engagement and marketing
  • leadership
  • professional development (PD)
  • scheduling
  • technology integration
  • workplace professionalism
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • LEADERS
  • NON-SCHOOL STAFF
  • SUPPORT STAFF
  • TEACHERS
Updated

Use the password reset website to change your MPS account password.

  • cybersecurity
  • leadership
  • workplace professionalism
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • GENERAL PUBLIC
  • LEADERS
  • NON-SCHOOL STAFF
  • STUDENTS/FAMILIES
  • SUPPORT STAFF
  • TEACHERS
Updated

Password security are best practices in creating a strong password that is difficult for others to guess/discover.

  • cybersecurity
  • technology integration
  • workplace professionalism
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • GENERAL PUBLIC
  • LEADERS
  • NON-SCHOOL STAFF
  • STUDENTS/FAMILIES
  • SUPPORT STAFF
  • TEACHERS
Updated

Phishing and Social Engineering are two common ways threat actors try to gain access to your personal information or your digital accounts.

  • cybersecurity
  • leadership
Self Service
  • central office
  • non-school site
  • special education
Updated

Self Service is a tool used on iPads and MAC computers. Self Service allows you to install apps and programs on your device by yourself; without having to contact IT Services.

LEARN MORE

  • creativity and design
  • curriculum support
  • cybersecurity
  • leadership
  • technology integration
  • ALL STAFF
  • CENTRAL OFFICE
  • CLERICAL
  • GENERAL PUBLIC
  • LEADERS
  • NON-SCHOOL STAFF
  • STUDENTS/FAMILIES
  • SUPPORT STAFF
  • TEACHERS
Updated

Tax scam prevention refers to steps people can take to avoid falling for scams related to paying taxes.

  • cybersecurity
  • engagement and marketing
  • leadership
  • physical safety
  • technology integration
  • workplace professionalism
Virtual Private Network (VPN)
  • central office
  • non-school site
Updated

Virtual Private Networks (VPNs) are software that allow you to log into the MPS. network when you are offsite.

VPN is only required if you're an employee who works remotely and requires access to SAP.

LEARN MORE

  • cybersecurity
  • finance
  • hybrid and remote work