Cybersecurity

CITE Cybersecurity Resources


Without a strong cybersecurity program, your organization is vulnerable to data theft, service disruption, and even legal action from parents or affected stakeholders if a data breach occurs.  A significant ransomware attack can affect your organization’s reputation for years.  The resources below are available to help you prepare for and respond to a serious cyber incident when one occurs.

Resources

Cyber Incident Response Plan (CIRP) Template

A CIRP is required by cyber insurance providers and helps prepare your agency to respond to a serious cyber incident.  The CIRP template was created by CITE K-12 technology professionals specifically for K-12 agencies and is maintained by the California County Superintendents’ Technology Services Committee (TSC). 

California County Superintendents Cyber Incident Response Plan (CIRP) Template


CIS Controls

The CIS Controls are recommended cybersecurity best practices and defensive actions developed by the Center for Internet Security (CIS). They provide specific and actionable ways to defend against common cyber threats and support compliance with various frameworks. The CIS Controls are a prioritized list of high-priority tasks that organizations can implement to significantly improve their cybersecurity posture.

Download The CIS ControlGuide To Implementation GroupsAbout Implementation Group #1Summary of 18 CIS Critical Security Controls 


Multi-Factor Authentication (MFA) Implementation Guide 

MFA is the most important security control you can implement, as most cyber attacks are directed towards staff. The attached workbook will help your agency implement MFA if you have not yet implemented it on all staff accounts.

San Diego County Office Of Education - MFA Workbook


CITE’s Data Privacy Service

LEAs use hundreds of apps in the classroom and ensuring that each app is compliant with student data privacy laws is difficult and time consuming. CITE's Privacy Services Program manages your LEA's Data Privacy Agreements (DPA's) and includes a dedicated technician for one-on-one support.

CITE Privacy Services 


Additional Disaster Recovery Resources 

A Disaster Recovery Plan (DRP) is critical to ensure your organization can recover technology services as quickly as possible in the event of a serious cyber incident.  If you don’t have a working plan in place, use this template and related disaster recovery resources to create a working Disaster Recovery Plan (DRP).  The template was created by CITE members from the County Offices of Education. A Business Continuity Plan (BCP) template is also available.

Additional Disaster Recovery Resources 


Cybersecurity: Top Considerations For Cybersecurity Insurance

The following systems and controls should be prioritized above others to ensure your agency is protected from most cyber threats. You should then work on implementing the remaining CIS Controls in Implementation Group 1.

Download Top Considerations For Cybersecurity Insurance


Government & Law Enforcement Cyber Contacts

Mandated Cyber Incident Reporting
If you experienced a Cyber incident that affected 500 or more staff, students, or stakeholders, you must file a report to Cal-OES.
If you experienced a data breach that affected 500 or more staff, students, or stakeholders, you must also file a report with the Attorney General’s Office using the link below.
  • Submit a Data Security Breach Notification to the Attorney General’s Office 
Cybersecurity Information for Non-Technical Audiences

This guide was created as a resource you can provide to your Board Members, Cabinet members, or other non-technical staff in your agency.

  • Implement Multi-Factor Authentication (MFA) for all staff accounts if you have not already.
  • Implement the recommendations in the Top Considerations for Cyber Security Insurance document.
  • Create a Cyber Incident Response Plan (CIRP).
  • Support and encourage an ongoing investment in IT systems and services that will improve the organization's cybersecurity posture and operational resilience.
  • Encourage and support cybersecurity and digital citizenship training at all staff levels.
  • Support the district and/or COE's ability to hire cybersecurity and technology staff. 
  • Ensure your LEA has a cyber liability insurance policy and ensure decisionmakers understand the requirements to stay insured.
  • Review board policies and administrative regulations related to technology use by staff and students and record storage and retention.
Cybersecurity-related terms and concepts in public school districts and County Offices of Education.
  • Business Email Compromise & Wire Fraud: The use of social engineering and phishing to trick employees into processing fraudulent payments to criminal actors.

  • Cyber Incident Response Plan (CIRP): a documented strategy outlining how an organization will detect, respond to, and recover from cyber security incidents like data breaches, ransomware attacks, and other disruptions.

  • DDoS, Distributed Denial of Services (DDoS), pronounced "D-Daws": An attempt to disrupt a network or server by flooding with requests from various systems on the internet which can prevent users from accessing your agency's website or other network resources. 

  • Malware: A type of software (commonly called a virus) designed to gain unauthorized access or damage a computer.

  • MFA, Multi-Factor Authentication, (MFA): is the use of a second method of verification besides a password to allow authorized access to a system. Increasingly this is a requirement for all cyber insurance.

  • Phishing: An attempt to have someone click on a link with the intent on stealing your password or other login credentials or provide private information via email, text, or other forms. Used in conjunction with other items like malware.

  • Ransomware: Malicious software designed to extort money by blocking access to files.

  • Social Engineering: Describes the efforts by attackers to use methods like phone calls, in-person visits, or similar tactics to gain sensitive information.