Responsive Navigation
Virtual Learning Environments (VLE)

 
Cybersecurity is no longer optional for educators. The shift to online education, accelerated dramatically by COVID-19, has changed more than just teaching methods. It has exposed educators and students to an expanding landscape of digital threats. 

The statistics paint a concerning picture. Cyber-attacks increased by 400% during the pandemic. Australia experiences approximately 300,000 attacks annually. One in five people click on malicious links in emails. Three billion phishing emails are sent globally every single day. 

Law enforcement agencies cannot address this volume alone. Educators delivering courses through virtual learning environments handle sensitive student data, login credentials, assessment information, and personal details—making them attractive targets for cyber criminals. This responsibility extends beyond personal security to modelling good practices for learners. 

This guide examines the primary threats educators face and outlines practical steps for protecting both themselves and their students in online and blended learning environments. 

Understanding the Threat Landscape 

Cyber criminals continuously develop new methods to steal information, and the education sector presents a particularly attractive target. Educational institutions often operate with limited IT security budgets while holding valuable student data. They also cannot afford extended downtime, making them more likely to comply with ransom demands. 

According to the Australian Cyber Security Centre (ACSC), cyber security threats are constantly evolving, requiring both individuals and organisations to stay informed about current risks and protective measures. 

Four main attack types pose the greatest risk to educators: 

Phishing attempts to trick recipients into revealing usernames, passwords, and credit card numbers. One in three data breaches originates from phishing attacks. 

Malware is malicious software designed to infiltrate computers, steal data, or damage systems. 

Ransomware encrypts files and demands payment for their release. 

DDoS attacks overwhelm websites with fake traffic, preventing legitimate users from accessing services. 

Phishing: The Most Common Threat 

Phishing attacks exploit psychological triggers to manipulate recipients into surrendering information without careful consideration. 

A typical phishing attempt might appear as an email from a bank, claiming an account problem requires immediate verification. The message includes a link and creates urgency—designed to prompt action before critical thinking kicks in. 

These tactics translate directly to educational contexts. Phishing emails may impersonate an institution’s IT department, learning management system, or colleagues. The objective remains consistent: extract credentials or prompt a dangerous click. 

Seven Signs of a Phishing Email 

Recognising phishing attempts requires attention to specific warning signs: 

  1. Suspicious sender addresses that don’t match the organisation’s legitimate domain. Scammers frequently use addresses differing by just one character from authentic ones. 
  1. Generic greetings such as “Dear Customer” or “Dear User” rather than the recipient’s actual name. 
  1. Urgent or threatening language demanding immediate action. Phrases like “Your account will be suspended” or “Immediate action required” signal potential fraud. 
  1. Mismatched URLs revealed when hovering over links (without clicking). The displayed URL should match the organisation’s actual website. 
  1. Requests for sensitive information. Legitimate organisations do not request passwords or credit card details via email. 
  1. Spelling errors or unusual grammar. However, sophisticated attacks may be well-polished. 
  1. Unexpected attachments, particularly from unknown senders or without prior context. 

Responding to Phishing Attempts 

The fundamental rule: avoid clicking links in emails without absolute certainty about the sender. Even legitimate-appearing emails warrant caution. Instead of clicking, navigate directly to the organisation’s website by typing the URL manually, use their official app, or contact them through verified phone numbers. 

Suspicious emails should be marked as spam, and the purported sender organisation should be contacted directly to verify authenticity. 

Pop-up windows on suspicious sites present another danger. Clicking either “yes” or “no” can trigger the same malicious action. The safest response is closing the window through the task manager. 

Two-Factor Authentication as Additional Protection 

Two-factor authentication (2FA) provides one of the most effective security measures available. After entering a username and password, the system sends a verification code via text or email. Access requires this secondary code. 

This additional step means that stolen passwords alone cannot compromise an account—attackers would also need the verification code. 

Enabling 2FA is advisable for all important accounts: social media, email, banking, work systems, and VLE logins. 

However, scammers have adapted to this security measure. Some phishing attempts now specifically target 2FA codes. Verification codes should never be shared with anyone who initiates contact unexpectedly. 

Malware: The Silent Threat 

Malware operates covertly after infiltrating a computer. It can steal information, damage systems, monitor activity, or conscript the device into a botnet—all without the user’s knowledge. 

Common infection vectors include email attachments, compromised websites, and software downloads from untrustworthy sources. Once installed, malware can operate in the background indefinitely, collecting and transmitting data to its creators. 

Prevention remains the most effective defence: 

Software updates deserve particular attention. These updates frequently include security patches addressing vulnerabilities that cyber criminals could exploit. Despite the inconvenience of update notifications, running outdated software presents far greater risks. 

Ransomware: When Data Becomes Hostage 

Ransomware represents one of the most damaging attack types. It encrypts files, rendering them inaccessible, then demands payment (typically in cryptocurrency) for the decryption key. 

Payment provides no guarantee of data recovery. Victims are negotiating with criminals who have no obligation to honour agreements. 

Educational organisations face particular vulnerability to ransomware. Limited IT security budgets, valuable student data, and inability to tolerate extended downtime make them attractive targets. 

The National Cyber Security Centre (UK) provides detailed guidance on mitigating ransomware attacks, emphasising the importance of backups and incident response planning. 

The most effective defence is maintaining regular, offline backups of critical data. With clean backups available, ransomware victims can restore their systems without paying ransoms. 

Virtual Learning Environments

DDoS Attacks: Overwhelming the System 

Distributed Denial-of-Service attacks flood servers with traffic volumes that prevent legitimate users from accessing services. While these attacks typically target organisations rather than individuals, they directly affect educators when they disable teaching platforms. 

learning management system that becomes unavailable or extremely slow during critical assessment periods may be experiencing a DDoS attack. 

Organisational responses to DDoS attacks require clear communication channels. Leadership needs regular updates, staff may require alternative work methods, and students need information about system status. 

Technical defences such as geofencing and IP address filtering fall within IT department responsibilities. Educators’ roles involve maintaining contingency plans for platform outages and communicating clearly with learners during disruptions. 

Virtual Learning Environments

Staying Safe Beyond the VLE 

Security practices must extend beyond virtual learning environments to other online activities. 

Safe Online Shopping 

Purchasing resources for courses or personal items online requires consistent security practices: 

Website verification is essential. Scammers create convincing replicas of legitimate sites, sometimes with URLs differing by only one character. 

HTTPS and the padlock icon in the browser address bar indicate an encrypted connection, protecting against “man in the middle” attacks that intercept data in transit. However, HTTPS certification does not guarantee website legitimacy—scammers can obtain these certificates too. 

Credit cards or PayPal offer superior fraud protection compared to debit cards. Compromised credit card information can be disputed without immediate loss of funds during investigation. 

The Risks of Public Wi-Fi 

Public Wi-Fi networks at cafes, airports, hotels, and conference venues offer convenience alongside significant security risks. Network trustworthiness cannot be verified, nor can the presence of malicious actors monitoring traffic. 

Activities to avoid on public Wi-Fi: 

Recommended practice: 

Regular users of public workspaces should invest in a quality VPN service. Many organisations provide VPN access to employees—checking with IT departments before purchasing separately is advisable. 

Identifying Red Flags: A Cybersecurity Scenario 

The following scenario illustrates multiple security failures. Consider how many red flags appear: 

A staff member preparing to leave on Friday afternoon receives an email from their boss requesting urgent payment to a priority client. They download and open the attached file titled “payment transfer information.” 

After opening the attachment, a pop-up indicates a required software update and provides an IT support number to call. The staff member calls the number and requests assistance. The “IT support” representative asks for full name, email address, and password. 

The staff member initiates the update and leaves their computer unlocked for the weekend. On Monday, they cannot access any systems or data. 

The red flags: 

  1. Friday afternoon timing creates urgency when people are rushing to leave, reducing careful consideration. 
  1. Urgent payment requests bypass normal verification procedures. 
  1. Unexpected attachments may contain malware. 
  1. Pop-ups triggered by attachments indicate suspicious activity. Legitimate attachments do not initiate software updates. 
  1. Phone numbers provided in suspicious messages may connect to scammers rather than actual IT departments. 
  1. Password requests from “IT support” represent a critical red flag. Legitimate IT staff never require user passwords. 
  1. Installing updates from unknown sources risks ransomware installation. 
  1. Unlocked computers provide attackers extended access time. 

The primary lesson: verification through official channels is essential. Passwords should never be shared with anyone, regardless of claimed identity. 

Essential Security Practices 

Effective protection requires consistent application of fundamental security practices. 

Strong Passwords and Password Managers 

Strong passwords contain at least 12 characters, combining upper and lowercase letters, numbers, and symbols. Each account requires a unique password—reusing passwords across sites creates vulnerability. 

Managing numerous complex passwords manually is impractical. Password managers such as 1Password, LastPass, Bitwarden, or Dashlane store passwords securely in encrypted vaults. Users need only remember one strong master password. 

Simple passwords like “Password123” or “Summer2024” can be cracked within seconds using modern techniques. Complex, unique passwords stored in password managers provide substantially stronger protection. 

Working from Home Security 

Remote and hybrid work arrangements introduce security challenges that differ from office environments. Home networks typically lack enterprise-level security measures. 

Essential practices for home-based work include: 

For comprehensive guidance on home network security, CISA’s guide on securing your home network provides practical steps for remote workers. 

Educator Responsibilities Toward Learners 

Educators bear additional responsibility for helping learners develop online safety awareness. Teaching courses with online or blended components involves modelling digital literacy and security practices alongside subject matter instruction. 

Security awareness has network effects. Poor security practices in one organisation create vulnerabilities for connected organisations. As compromises spread across networks, risk increases for everyone in the ecosystem. Security awareness training benefits the entire connected community. 

Integrating security awareness into teaching involves modelling appropriate practices in credential handling, resource sharing, and student communication. Teaching learners to recognise phishing attempts, create strong passwords, and protect personal information provides skills applicable far beyond any single course. 

Conclusion 

Personal and sensitive information, once accessible online, cannot be controlled. Uploaded data can be copied, saved, and mirrored across multiple sites indefinitely. 

Cybersecurity knowledge protects educators while enabling them to prepare learners for safe engagement in an increasingly digital world. This responsibility extends beyond IT departments to everyone participating in online education. 

Vigilance and ongoing education remain the most effective defences against evolving cyber threats.