Skip to main content
Inspiring and leading innovation in education
Search this site
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
Menu
Cybersecurity Resources
Page Description Image
About SDCOE
Our Locations
Local Control and Accountability Plan
Staff Directory
Annual Report
Superintendent
Board of Education
Board Members
Agenda and Minutes
Meeting Webcasts
Board Policies
Programs and Services
Currently selected
Business Services
Integrated Technology Services
Learning and Leadership Services
Student Services and Programs
Human Resources
Credential Services
Fingerprinting Services
Teacher Effectiveness and Preparation
Personnel Commission
Our Schools
Cuyamaca Outdoor School
Davila Day School
Friendship School
HOPE Infant/Toddler
Juvenile Court and Community Schools
North County Academy
Our Priorities
Career Technical Education
Equity
Innovation
Organizational Effectiveness
SDCOE
»
Integrated Technology Services
»
Cybersecurity Services
»
Cybersecurity Resources
Cybersecurity Resources
Page Content
Awareness
Article: Mobile Device Security
Article: Sometimes (Free) WiFi Can be Costly
Article: Digital DNA and Identity Theft
Article: Cyberbullying and Social Media
Article: 10 Commandments of Password Management
Article: How to Protect Against Ransomware
Article: Social Media, Education and Data Privacy
Article: USB Flashdrive Security
Flyer: Don't Be Fooled on April 1st and Beyond
Flyer: Privacy Tips Using Social Media to Post Vacation Photos
Flyer: Avoid the 12 Scams of the Holidays
Flyer: Valentine's Day is Yet Another Opportunity for Cybercriminals to Try to Trick us online.
Flyer: Cybersecurity's New Years Resolutions
Flyer: Proclaim Independence from Hackers
Flyer: Dad Jokes are Funny
Flyer: Teach Your Mom to be CyberAware
Flyer: Social Media in the Classroom - Do's and Don'ts
Flyer: 5 Tips for online Financial Security
Flyer: Top 10 Cybersecurity Tips
Flyer: Holiday Sales
Flyer: Yearly Reminder
Flyer: 5 Ways to Protect
Flyer: Spring Break Road Trips?
Flyer: This Tax Season Don't Get Scammed
Flyer: May Gray
Flyer: Spring CyberSafety Tips
Flyer: Social Engineering
Flyer: What Does a Phishing Email Look Like?
Flyer: Freeze Your Credit
Flyer: Don't Fall for Phishing
Flyer Template: Top 10 Cybersecurity Tips
Flyer Template : 5 Tips for online Financial Security
Flyer Template : Cybersecurity's New Years Resolutions
Flyer Template : Don't Be Fooled on April 1st and Beyond
Flyer Template : Privacy Tips Using Social Media to Post Vacation Photos
Flyer Template : Avoid the 12 Scams of the Holidays
Flyer Template : Valentine's Day is Yet Another Opportunity for Cybercriminals to Try to Trick us online
Flyer Template : Proclaim Independence from Hackers
Flyer Template : Dad Jokes are Funny
Flyer Template : Teach Your Mom to be CyberAware
Flyer Template : Social Media in the Classroom Flyer
Flyer Template: Holiday Sales
Flyer Template: Yearly Reminder
Flyer Template: 5 Ways to Protect
Flyer Template: This Tax Season Don't Get Scammed
Flyer Template: Spring Break Road Trips
Flyer Template: May Gray
Flyer Template: CyberSafety Tips for Spring
Flyer Template: Social Engineering
Flyer Template: What Does a Phishing Email Look Like?
Handout: CETPA Conference - Cybersecurity On a Budget
Newsletter : CyberGuru Oct 2017 Edition
Newsletter : CyberGuru Nov 2017 Edition
Newsletter: CyberGuru Dec 2017 Edition
Newsletter: Cyber Guru Jan 2018 Edition
Feb 2018 Bits & Bytes : Cybersecurity Department Featured
Newsletter: Cyber Guru Feb 2018 Edition
Newsletter: Cyber Guru Mar 2018 Edition
May 2018 Bits & Bytes : Cybersecurity Department Featured
Newsletter : CyberGuru April 2018 Edition
Newsletter : CyberGuru May 2018 Edition
Newsletter : CyberGuru June 2018 Edition
Newsletter: Cyber Guru July 2018 Edition
Newsletter: Cyber Guru Aug 2018 Edition
Newsletter: Cyber Guru Sept 2018 Edition
Newsletter: Cyber Guru Oct 2018 Edition
Newsletter: Cyber Guru Nov 2018 Edition
Presentation: 2018 Summit - "Child Identity Theft" by Randall Lawrence
Presentation: 2018 Summit - "Lessons from the Chron. : Security Breaches at Educational Institutions and What We can learn from Looking at the Data" by Emory Roane
Presentation: 2018 Summit - "Getting to Governance: Building a Student Data Privacy Program" by Linnette Attai
Presentation: 2018 Summit - "Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective" By SA Peter M. Casey
Presentation: 2017 Summit - Incident Response Program by Matthew Stamper
Presentation: 2017 Summit - Threat Intelligence By Gary Hayslip
Presentation: CETPA Conference Slides
Using MS-ISAC Resources
Training
How-To Guide: Clear Browser Cookies & Cache on Mobile Devices
How-To Guide: Reset Home Router Password
How-To Guide: How to Clear Cache
How-To Guide: Attach Emails As Attachments
How-To Guide: Clear Browser Cookies
Vulnerabilities
Procedures
Template: Acceptable Encryption Standard
Template: Acceptable Use of Tech Procedure
Template: Bring Your Own Device Procedure
Template : Clean Desk
Template: Desktop Anti-Virus Procedure
Template: FERPA Compliance procedure
Template: Identifying and Securing Personally Identifiable Information V1 (CSP012)
Template: Minimum Access Procedure
Template: Mobile Device Encryption Procedure
Template: Email Use Procedure
Template: End User Phishing Procedure
Template: Workstation Security Procedure
Template: Software Installation For Non-Administrators Procedure V1 (CSP016)
Template: Travel Procedure
Template: Virtual Machine Security Procedure
Template: Virtual Server Security Procedure
Template: Wireless Infrastructure Procedure
Template: Wireless Infrastructure Standard
Template: Removable Media Procedure
Template: Social Engineering Avoidance Procedure
Template: Social Networking Procedure
Template: Software Installation For Administrators Procedure
Template: Password Procedure
Template: PCI-DSS Procedure
Template: Protection of Computerized Personal Information Procedure
SDCOE Bring Your Own Device Procedure
SDCOE Email Use Procedure
SDCOE Mobile Device Encryption Procedure
SDCOE Password Procedures
SDCOE Removable Media Procedure
SDCOE Virtual Machine Security Procedure