Security and Safe Computing
Information on IT security including the ability to report a security incident and how to protect yourself.
Lock Your Computer Screen
Microsoft Windows
macOS
Why should you lock your screen when you're away?
This helps prevent others from viewing or using your device when you're not around. Set up your computer and mobile devices to automatically go to screensaver after a certain amount of inactivity. In addition, manually lock when leaving your device unattended.
Antivirus Security
All computers (Mac, PC and Linux) are susceptible to viruses, spyware, and malware. That is why it is important to protect your computer from potential viruses by having an antivirus program installed on your personal computer. All Buckley-owned computers have an antivirus agent installed on them.
Backup Data Protection
Backup protection is needed on all servers and data systems due to human error, illegitimate deletion, programmatic errors, phishing, malicious insiders, malware and ransomware, and hackers to name a few.
​
Buckley uses cloud-based backup services to help protect our use of Google Suite (Drive, Calendar, and Contacts), Microsoft email, and networking and systems equipment.
Encryption
Portable devices such as laptops, tablets, and USB storage are most at risk for being misplaced or stolen. If a device is lost or stolen, encryption prevents unauthorized users from accessing data stored locally on the device. Without encryption, unauthorized users can use various techniques to bypass the accounts and permissions in order to access the local drive contents.
In order to meet our legal obligations and our responsibility to protect the privacy of those we serve, The Buckley School requires full disk encryption to be implemented on all school owned mobile computing devices (i.e. laptops, tablets, USB storage). The best way to avoid theft or loss of sensitive data is to keep it in a secure file storage offering such as department shared drives, where it's physically secured and regularly backed up. Then, you can easily access the information remotely from your mobile computer. However, encryption is our safety net for new files, temporary (cached) files, and other information that is stored on a mobile device. The Buckley School utilizes FileVault2 encryption for macOS mobile systems, and Microsoft BitLocker for Microsoft Windows mobile systems.
FileVault2 Encryption
This service provides a simplified administrative interface for managing and monitoring FileVault2 encryption on macOS systems. It also offers enhanced protection against data theft and data exposure for macOS systems that are lost or stolen.
Microsoft BitLocker
Microsoft Bitlocker is a full encryption feature included with Microsoft Windows versions that is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.
Firewall
A firewall filters incoming Internet traffic while allowing you (and those behind the firewall) to communicate with the Internet.
​
Local Administrator Rights
Users are not granted local administrator rights on school-owned devices.
​
Why restrict local administrator rights?
Local admin rights give the user too much power. Endpoints are where many of the greatest risks to enterprise security lie, and giving users control over those endpoints only opens networks to more risk.
Malware is around every corner. Regular Web browsing and email phishing put workstations at constant risk. If users have local admin rights, the risk is even greater because they can veto IT's security measures.
Multifactor Authentication
Multi-factor authentication is when a user must provide two or more pieces of evidence to verify their identity to gain access to an app or digital resource. Multi-factor authentication (MFA) is used to protect against hackers by ensuring that digital users are who they say they are.
​
​
Google Workplace: Setup 2-Step Verification on Your Buckley Google Account
Phishing
KnowBe4 is our security awareness training tool. It helps us create a “human firewall” to protect us against malicious emails. This program consists of both a training campaign and simulated phishing attacks. It provides our users with a Phish Alert Button to report phish emails.
The Phishing Alert Button allows you to report a potential phishing email via your Outlook desktop client, Outlook web client or Outlook mobile client. This will empower the Information Technology department to review the email and take immediate action. We ask you to report all phishing emails using the Phishing Alert Button.
-
Zoom - How do I obtain the teacher’s Zoom link?The teacher will post the link on the classpage announcements within MyBUCKLEY or The teacher will email the link to the class
-
Zoom - How do I see a list of participants?Once the meeting has begun, click on Participants to see a list of all participants How do I mute/unmute myself?
-
Zoom - How do I mute/unmute myself?The teacher may or may not allow students to unmute themselves. If you’d like to talk, you may use the Raise Hand (bottom-right button within the Participants window pane). This will let your teacher know you need their attention
-
Zoom - How do I get the teacher’s attention?If you’d like to talk or ask a question, you may use the Raise Hand (bottom-right button within the Participants window pane). You may toggle between Raise Hand and Lower Hand, if needed.
-
Zoom - How do I Chat with my teacher or other students?Once the meeting has begun, click on Chat (below-middle). Within the bottom-left of the Chat window pane you can change the To: field from Everyone to your teacher. Most teachers will NOT allow you to chat with other students unless the lesson requires it.
-
Zoom - How do I start recording?Students should not be allowed to record meetings. Please consult your teacher. Your teacher will record and share the meeting, if needed.
-
Zoom - What is Zoom's Privacy Policy?As a K-12 education customer, the following privacy policy governs our accounts: https://zoom.us/docs/en-us/childrens-privacy.html
-
Zoom - How do I unmute a participate/student?Ask All to Unmute: Display a pop-up notification to all muted participants with option to unmute themselves or stay muted. A host can't unmute a participant automatically. The participant must approve their microphone being unmuted.
Simulated Phishing Campaign
Employees receive simulated phishing emails on an ongoing basis. These tests provide us with insight and analytics, and help us determine further training initiatives.
​
​
Remedial Training
If our simulated phishing campaign determines that someone requires further training, an employee will automatically be enrolled in remedial training.
Our anti-spam service provides protection from spam and phishing emails sent to Buckley email addresses.
It helps quarantine emails and decrease phishing attempts.
​
Click Here to Manage your Quarantine Emails
​
​
​
Sample Email
Web Filtering
Buckley IT is required by law to implement content filtering and monitoring. We meet this requirement by installing a dedicated content filtering device that sits on our network and evaluates all requests for web pages. It protects against access to visual depictions that are obscene, pornography-related, or harmful to minors.
​
While we perform content filtering that blocks inappropriate content on all Buckley networks, these will never be sufficient to completely protect students from inappropriate content. Faculty must continue to monitor student activity with old-fashion shoulder surfing and watch for signs that students have found a method to bypass filters.
​
Blocked Categories
Additional categories are blocked on student and guest networks. Some of these include:
Chat, Gambling, Games, Instant Messaging, Social Networking, and Video Sharing
Request to Unblock a Page or Category
When blocked, users are presented with an option to submit a request for a page to be unblocked. Buckley IT will verify with faculty or administration before unblocking a page or category.
For a complete list of blocked categories for All or for student networks, please contact Buckley IT.
​
YouTube
YouTube is filtered on all Buckley networks. Faculty and students must SIGN IN with their Buckley email account to gain access to all YouTube content/videos. Otherwise, some videos will not be available when onsite.
Approving a Video
Once signed in, faculty may approve (whitelist) a video to make it available for Buckley students when onsite. Faculty may do so by clicking on the Approve button (located under the video). This feature is available for faculty only, and faculty need to be signed in and onsite.