Enable JavaScript to ensure website accessibility
Skip to main content

North Canton City Schools

Home of the Vikings

Cybersecurity

As technology continues to play a bigger role in our children’s education and daily lives, it’s more important than ever for all of us—regardless of our technical background—to understand the basics of cybersecurity.

Cyber risks like phishing scams, fake links, and online threats are not just problems for businesses or tech experts. These dangers can target anyone, including children and families. A simple click on a suspicious link or an unintentional download can lead to identity theft, privacy breaches, or even harm to your child's learning environment.

We want to ensure every family feels confident and informed when it comes to protecting personal information and using the internet safely. That’s why we’re providing easy-to-understand tips, guides, and resources—no tech skills required.

By working together and staying informed, we can build safe digital habits that help protect our children at school and at home.  The following information is intended to help you as you navigate the world of cybersecurity risks.  

  • How to Create a Strong Password


    Why Strong Passwords Matter
    A weak password is like using a tiny lock on a treasure chest — easy to break into. Strong passwords keep your personal info safe from hackers and online threats.

    Tips for Creating Strong Passwords:

    1. Use at least 12 characters
       Longer is stronger!
    2. Mix it up
       Use a combination of:
      • UPPERCASE letters
      • lowercase letters
      • Numbers (123)
      • Symbols (!@#$%^&*)
    3. Avoid personal info
       Don’t use names, birthdays, or favorite sports teams — those are easy to guess.
    4. Don’t use real words
       Hackers use tools to guess words from dictionaries. Try using made-up phrases or a random mix.
    5. Try a passphrase
       Combine unrelated words that are easy for you to remember but hard for others to guess. Example: BlueTiger$Radio7!

     

    Biggest Takeaway:  Make Your Email Password Your Strongest and Most Secure Password and Different From Any Other Password.  Your email account is like the master key to your online life.  If someone gets into your email, they can often use it to reset the passwords for your other accounts – like your bank, social media, or shopping sites – and take them over too.

    Bonus Tip: Use a Password Manager
    Remembering all your strong passwords can be tough — a password manager can safely keep track of them for you!

    What to Avoid:

    • Password123
    • YourName2024
    • qwerty or 123456
    • Reusing the same password on different sites
  • What is a Password Manager?


    Think of a Password Manager Like a Super-Secure Keychain

    Every website you use (like email, banking, or shopping) is like a locked door. Your password is the key.

    Instead of trying to remember dozens of different passwords (or using the same one everywhere, which isn’t safe!), a password manager helps you keep track of them all — safely and easily.

    Here’s how it works:

    • You create ONE strong master password.
    • That password unlocks your password manager (your secure keychain).
    • The manager stores all your other passwords and even fills them in for you when you visit websites.
    • It can also create strong, unique passwords for you that hackers can't guess.

    Why Use One?

    • No more forgotten passwords.
    • Safer than writing them down or reusing the same one.
    • Saves time and keeps you protected online.

    Popular Password Managers*:

    • 1Password
    • Bitwarden
    • Dashlane

     

    Bonus Tip: Never share your master password with anyone, and make sure it’s strong!


    Stay safe. Stay smart. Let your password manager do the remembering!

    *Specific solutions or companies listed are just examples and not necessarily recommended by NCCS.

  • What is Antivirus Software?


    Antivirus software is like a security guard for your computer.
    It helps protect you from viruses, scams, and other online threats.

    What Does Antivirus Software Do?

    • Scans your computer for harmful software (like viruses, spyware, or ransomware)
    • Blocks suspicious activity before it causes problems
    • Warns you if you're about to click on a dangerous website or file
    • Keeps your personal information safer while you're online

     

    Do I Really Need It?

    Yes! Even if you're careful, bad stuff can still sneak in. Antivirus software adds an extra layer of protection.

    Common Threats Antivirus Can Help Prevent:

    • Viruses that can damage or slow down your computer
    • Spyware that tries to steal your personal info
    • Ransomware that locks your files and demands money
    • Phishing scams that trick you into giving away passwords

     

    Tips for Using Antivirus Software:

    • Keep it updated so it can catch the latest threats
    • Run regular scans, or set it to scan automatically
    • Don’t ignore alerts or warnings it gives you

     

    Popular Antivirus Programs*:

    • Norton
    • McAfee
    • Bitdefender
    • Avast
    • Windows Defender (built into Windows computers)

    Bottom Line:
    Antivirus software helps you stay safe online. It's a small step that makes a big difference!


    *Specific solutions or companies listed are just examples and not necessarily recommended by NCCS.

  • Tips for Safer Online Shopping


    Shopping online is convenient, but it’s important to stay safe. Here are some simple tips to help you shop smart and avoid scams.

    1. Shop from Trusted Websites

    • Stick to well-known stores or websites you know and trust.
    • Be cautious of deals that seem too good to be true — they often are!

    2. Look for the Lock

    • Make sure the website address starts with "https://" and shows a little padlock icon in the address bar. That means the site is secure.

    3. Use Strong, Unique Passwords

    • If you create an account on a shopping site, use a strong password.
    • Don’t reuse the same password for multiple sites.

    4. Use a Credit Card or Secure Payment Method

    • Credit cards often offer better fraud protection than debit cards.
    • Services like PayPal add another layer of security.

    5. Watch Out for Phishing Scams

    • Don’t click on links in emails or texts that claim to be from stores — go directly to the store’s website instead.

    6. Check Return Policies and Reviews

    • Before you buy, read the return policy and reviews from other buyers.

    7. Keep an Eye on Your Bank Statements

    • After making a purchase, monitor your account for any unexpected charges.

    8. Avoid Public Wi-Fi When Shopping

    • Try not to shop while using public Wi-Fi (like at a coffee shop). Use a secure connection at home or use a VPN.

    Bottom Line:
    Online shopping is easy and fun, but a few simple precautions can help you avoid trouble. Stay alert, shop smart, and enjoy the convenience safely!

  • What Are Cache and Cookies?


    Ever heard someone say, "Clear your cache and cookies" and wondered what that even means? You're not alone! Here's a simple breakdown.

    What Is Cache?

    Think of cache like a short-term memory for your web browser.

    • It stores parts of websites (like images and files) so they load faster the next time you visit.
    • This helps websites open quicker and saves data.

    Example: The first time you visit a news site, it might take a few seconds to load. The second time, it loads faster because the browser remembers parts of it from the cache.

    What Are Cookies?

    Cookies are small files that websites save on your device to remember things about you.

    • They help websites remember your login info, preferences, or what’s in your shopping cart.
    • Some cookies track your activity across websites (that’s how ads seem to "follow" you).

    Example: You log into your email once, and the next time you go back, it keeps you logged in — that’s a cookie at work.

    Why Clear Cache and Cookies?

    • Fix website issues (like loading errors or old info showing up)
    • Free up storage space
    • Protect your privacy

    How Often Should You Clear Them?

    • Every few months is fine for most people.
    • If a website isn't working right, clearing cache and cookies can often fix it.

    Bottom Line:
    Cache and cookies help make your online experience smoother, but it's a good idea to clean them out once in a while!

  • What Is a VPN?


    VPN = Virtual Private Network
    Think of a VPN like a secure tunnel between your device and the internet. It hides your location and activity from others, making your online experience more private and safe.

    What Does a VPN Do?

    • Protects your privacy by hiding your internet activity from hackers, advertisers, and even your internet provider.
    • Secures public Wi-Fi connections (like at coffee shops or airports).
    • Lets you browse safely even when you're away from home.

    When Should You Use a VPN?

    • On public Wi-Fi (at coffee shops, airports, hotels)
    • When shopping or banking online
    • When you want to keep your online activity private

    How It Works (In Simple Terms):

    • Normally, when you use the internet, your data travels openly across networks.
    • With a VPN, your data is encrypted (locked up) and sent through a private tunnel to its destination.

    Benefits of Using a VPN:

    • Keeps your information safe from hackers
    • Hides your IP address (your online "home address")
    • Lets you browse more privately

    Popular VPN Services*:

    • NordVPN
    • ExpressVPN
    • ProtonVPN
    • Surfshark

    Things to Remember:

    • VPNs don’t protect against viruses — you still need antivirus software.
    • Free VPNs can be risky — choose a trusted provider.
    • A VPN may slightly slow down your internet speed (but it's usually worth it for the added protection).

    Bottom Line:
     A VPN helps keep your online activity private and secure, especially when you're using public Wi-Fi or doing sensitive tasks like online banking.


    *Specific solutions or companies listed are just examples and not necessarily recommended by NCCS.

  • Understanding Phishing and Its Sneaky Variations


    Phishing is when someone tries to trick you into giving away personal information, like passwords or credit card numbers, by pretending to be someone you trust.

    Here are some common types of phishing you might hear about:

    1. Phishing (General)

    • Fake emails that look like they’re from real companies (like your bank or Amazon).
    • They usually ask you to click a link or enter information.
    • Tip: Don’t click links or open attachments from people you don’t know.
       

    2. Smishing (SMS Phishing)

    • Phishing through text messages.
    • You might get a message that says your package is delayed, or there’s a problem with your account.
    • Tip: Never click on links in texts from unknown numbers.
       

    3. Vishing (Voice Phishing)

    • Scammers call you pretending to be from a trusted place (like the IRS or your bank).
    • They try to get personal info or money over the phone.
    • Tip: Hang up and call the official number yourself to verify.
       

    4. Angler Phishing (Social Media)

    • Fake messages or accounts on social media that trick you into clicking links or giving info.
    • They may pretend to be customer support.
    • Tip: Don’t share personal info through direct messages.
       

    5. Spear Phishing

    • A more personalized scam. The attacker knows your name or where you work.
    • They make the message look very real to trick you.
    • Tip: Even if it looks legit, pause and verify.
       

    6. Whaling

    • Aimed at high-profile targets like CEOs or executives.
    • It’s like spear phishing but for the "big fish."
    • Tip: The same rules apply — stay cautious and confirm before responding.
       

    Bottom Line:
    These scams are getting trickier, but you can protect yourself by being cautious, double-checking messages, and never giving out personal info unless you're 100% sure it's safe!

  • 💬 What Is Social Engineering?

    Social engineering is when someone tries to trick you into giving away information or access.
    Instead of hacking computers, they "hack" people — using emotions like trust, fear, or curiosity to get what they want.

    Common goals:

    • Steal passwords or personal information
    • Gain access to accounts or systems
    • Trick you into sending money or clicking harmful links

    🎭 Common Social Engineering Tricks

    Technique

    What It Looks Like

    What They’re After

    Phishing

    Fake emails or texts that look official (“Your account is locked—click here!”)

    Login info or personal data

    Vishing (Voice phishing)

    Calls pretending to be tech support, school staff, or banks

    Access codes or payment details

    Smishing (SMS phishing)

    Text messages with fake delivery notices or links

    Personal info or downloads

    Impersonation

    Someone pretends to be a trusted person—like a teacher, principal, or friend

    Trust and access

    Baiting

    Offers “free” downloads, prizes, or rewards

    Malware or stolen data

    Urgency Scams

    “Act now or your account will be closed!”

    Emotional reaction before thinking


    🛡️ How to Stay Safe

    Pause Before You Act
    If a message or call feels urgent or emotional—stop and think. Scammers want you to act quickly.

    Verify the Source
    Contact the person or organization directly using a known phone number or official website, not the link or number provided in the message.

    Don’t Share Personal Info
    Never share passwords, PINs, or security codes over email, text, or phone unless you initiated the contact.

    Check Links and Emails Carefully
    Look for misspellings, odd addresses, or unusual requests.
    Example:
    schooldistrict.info vs. schooldistrict.org

    Talk With Your Child
    Teach kids to be cautious online—especially with links, pop-ups, and messages from “new friends” or “school tech support.”

    Report It
    If you receive a suspicious message related to school, forward it to your district’s IT department or help desk.


    👨👩👧 Family Tip

    Practice a “Think Before You Click” rule at home.
    If something online feels strange, ask first—click later.


    🚨 If You Think You’ve Been Tricked

    1. Change your passwords right away.
    2. Run a security scan on your device.
    3. Contact your school’s IT team if it involves school accounts.
    4. Keep an eye on accounts for unusual activity.

    💡 Remember

    Social engineers don’t break in — they trick their way in.
    Awareness is your best defense.

  • 🤖 What Is a Deepfake?

    A deepfake is a photo, video, or audio recording that has been digitally changed using artificial intelligence (AI) to make it look or sound real — even when it isn’t.

    Deepfakes can make it appear that:

    • Someone said or did something they never did
    • A real person’s face or voice was used in a fake video
    • News, messages, or online posts came from a trusted source

    While some deepfakes are made for fun or entertainment, others are used to spread false information, bully, or scam people.


    😈 Common Ways Deepfakes Are Used

    Type

    What It Looks Like

    The Risk

    Fake News Videos

    A “news clip” showing a famous person making false statements

    Spreads misinformation or confusion

    Scam Calls or Voice Clones

    A phone call that sounds like a friend, teacher, or relative asking for help or money

    Steals money or personal data

    Fake School or Principal Messages

    A video or voicemail that looks official but contains false info or requests

    Tricks parents into sharing private details

    Social Media Fakes

    Altered videos or photos of students or staff shared online

    Harassment, bullying, or reputation damage


    🧠 How to Spot a Deepfake

    👀 Look Closely

    • The face may not match the lighting or shadows.
    • Mouth movements can seem slightly “off.”
    • Eyes might not blink naturally or focus correctly.

    🎧 Listen Carefully

    • The voice might sound flat, robotic, or “too perfect.”
    • Background sounds or timing may seem unnatural.

    🔍 Check the Source

    • Is it from an official school or news account?
    • Can you find the same information from a trusted source?

    🚩 Watch for Emotion
    Deepfakes often try to make you feel angry, scared, or shocked so you’ll react before verifying.


    🛡️ How to Stay Safe

    Pause Before You Share
    If a video or message seems strange or extreme, verify it before forwarding or posting.

    Go to the Source
    Check your school’s official website or verified social media for announcements.

    Talk to Your Child
    Teach kids that not everything online is real — especially videos and voice clips.

    Protect Your Photos and Videos
    Be thoughtful about what images or recordings you post publicly; they can be copied or altered.

    Use Trusted News and Apps
    Encourage your family to get information from reliable, known sources — not random social media posts.


    🚨 If You Suspect a Deepfake

    1. Don’t share or repost it.
    2. Report it to the platform or your school.
    3. Ask for confirmation from the person or organization it claims to show.
    4. Document and save the link or screenshot if needed for reporting.

    💬 Remember

    Deepfakes are getting more convincing — but critical thinking and caution are still your best defenses.
    When in doubt, stop, think, and verify before you believe or share.

  • 🔗 What Is Link Manipulation?

    Link manipulation is when scammers create links that look real but actually lead to dangerous websites. These fake links are often used to:

    • Steal personal information (like passwords or credit card numbers)
    • Install viruses or spyware
    • Trick you into logging into fake versions of real websites (like school portals or banks)

    😈 Common Link Manipulation Tricks

    Technique

    How It Works

    Lookalike URLs

    Replaces letters to look legit. Example: g00gle.com vs google.com

    Masked Links

    Shows one link, but sends you to another. Example: Click here leads to scam

    Typosquatting

    Slight misspellings of real sites. Example: faceboook.com

    Shortened Links

    Uses services like bit.ly to hide the real link address

    Fake Login Pages

    Looks like your school login or email, but steals your info


    🛡️ How to Stay Safe

    Hover Before You Click
     On a computer, hover your mouse over a link to see where it really goes (shown in the bottom-left corner of your screen).

    Check for Misspellings
     Scammers often use tiny spelling mistakes. Look closely!

    Use Trusted Sources
     Only click links from people or organizations you know. Be cautious even with messages that look official.

    Avoid Shortened Links
     Unless you're sure of the source, don't click on shortened URLs like bit.ly/something.

    Enable Security Features
     Keep browsers and antivirus software up to date. Most have built-in protection against bad links.

    Teach Your Child to Ask First
     Encourage your child to check with you or a teacher before clicking unknown links—especially in emails or text messages.


    🧠 Quick Tip for Families

    If a link asks you to log in, don’t click it right away. Instead, go directly to the official website by typing the URL yourself (e.g., type https://www.northcantonschools.org instead of clicking an email link).


    🚨 What to Do If You Clicked a Suspicious Link

    1. Don’t enter any information on the page that opens.
    2. Close the tab or window immediately.
    3. Run a security scan using antivirus software.
    4. Change your password if you entered it on a fake site.

    👨‍👩‍👧 Your Family’s Digital Safety Matters

    Staying informed helps you protect yourself and your child online. When in doubt, don’t click!

  • What is Malware?


    Malware = Malicious Software
    It's a general term for any kind of bad software that tries to harm your computer, steal your information, or trick you online.

    What Can Malware Do?

    • Slow down or crash your computer
    • Steal personal information (like passwords or credit card numbers)
    • Lock your files and demand money to unlock them (ransomware)
    • Show annoying ads or redirect you to fake websites

    Common Types of Malware:

    • Viruses: Spread from file to file, damaging your system
    • Spyware: Secretly watches what you do online
    • Ransomware: Locks your files until you pay a ransom
    • Trojans: Disguised as helpful programs but do harm once installed
    • Adware: Bombards you with unwanted ads

    How Does Malware Get on Your Device?

    • Clicking on fake links or pop-ups
    • Downloading attachments from suspicious emails
    • Visiting unsafe websites
    • Installing software from untrusted sources

    How to Protect Yourself:

    • Use antivirus software and keep it up to date
    • Don’t click on strange links or open unknown attachments
    • Only download apps and programs from trusted sources
    • Keep your system and software updated

    Bottom Line:
    Malware can be sneaky, but a little caution and the right tools can help you stay safe!

  • The Risks of Using Devices or Software Past Their End of Life (EOL)


    What Does “End of Life” Mean?
    When a device or software reaches End of Life (EOL), it means the company that made it has stopped supporting it. That includes no more:

    • Updates
    • Security patches
    • Technical support

    Even if it still “works,” it may no longer be safe to use.

    Why Is This a Big Deal?

    1. Security Risks
     No updates = no protection from new threats. Hackers know which systems are outdated and target them.

    2. Compatibility Problems
     Older software or devices may not work well with newer apps, websites, or other devices.

    3. No Support
     If something goes wrong, you can’t get help from the company.

    4. Performance Issues
     Old devices or software can run slowly, freeze, or crash more often.

    Examples of EOL Risks:

    • Still using Windows 7? It hasn’t had security updates since 2020.
    • Old phones may stop receiving app updates, making them more vulnerable.
    • Outdated antivirus software may not catch new threats.

    How to Stay Safe:

    • Replace old devices when they no longer get updates.  Purchase brand names from reputable vendors.
    • Upgrade your software to the latest version.
    • Turn on automatic updates.
    • If you’re not sure if something is outdated, ask a trusted tech-savvy friend or support person.

    Bottom Line:
    If your device or software is no longer supported, it could be putting you at risk. Staying updated helps keep your information safe and your technology running smoothly.