Department of Defense Education Activity

Online Security

Cybercrime is any criminal activity that involves a computer, networked device or a network. These crimes are carried out in order to generate profit, spread malware, relay illegal information and materials or to just plain damage or disable a device/network.

Cybercrime is now the number one threat to U.S. national security.

Cybercriminals may target an individual's private information or corporate data for launching a phishing attack. Phishing is the fraudulent practice of using email or malicious websites to infect your machine with malware and viruses that collect personal and financial information. Cybercriminals want you to believe these spoofed communications are real to lead you to download malicious software, send money, or disclose personal, financial, or other sensitive information. 

Play Hard to Get With Strangers

If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email.

⛳ Report phishing attempts, spoofing, or when you've fallen victim to a cyber scam by filing a complaint with IC3

⛳To see examples of actual phishing emails, and steps to take if you believe you received a phishing email, go to

Tips on working from home

#Cybersecurity At The Office

Businesses face significant financial loss when a cyberattack occurs. In 2019, the U.S. business sector saw a 17% increase in data breaches.

Cybercriminals often rely on human error — employees failing to install software patches or clicking on malicious links — to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the vigilance of everyone to keep data, customers, and capital safe and secure.

#BeCyberSmart to connect with confidence and support a culture of cybersecurity at your organization. Download the 5 Ways to be Cyber Secure at Work tip sheet.

PRECAUTION: Only use technology from trusted sources.

Telework Best Practices

The COVID-19 pandemic, among other things, has enabled a massive experiment in teleworking. Up to half of American workers are currently working from home, more than doubling those who worked from home (at least occasionally) from 2017 to 2018.

  • Only use DoDEA-approved collaboration tools, including but not limited to chat and video conferencing platforms
  • Only connect government equipment to a network you are in complete control of (e.g. home network). Do not connect to a network you do not own and control (e.g. public Wi-Fi).
  • Do not share devices (e.g. with family or other household members) that are used for work.
  • Do not leave your computer unlocked when unattended.

For more tips, download the Telework Best Practices tip sheet.

Reminder: Hackers use texts, emails, messages on social media, and phone calls to scam victims.


Phishing & Ransomware

Cyber Tricks : Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.

Reminder: Always report suspicious emails to your local IT help desk. Download the Phishing tip sheet.

Password protocol

Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime. No citizen is immune to cyber risk, but #BeCyberSmart and you can minimize your chances of an incident.

Download the Creating a Password tip sheet.

PRECAUTION: Don’t use the same password everywhere.




Contact IT Customer Support Services for additional support (VPN & CAC required).
Contact: Nicole McNealy, IT Communications, for questions about this page
Denotes alink that requires CAC Authentication