Skip navigation
Select a School
DISTRICT
Lexington City Schools
Elementary Schools
Charles England Elementary
Pickett Elementary
Southwest Elementary
Middle Schools
Lexington Middle School
High Schools
Lexington Senior High School
Other
South Lexington Developmental Center
South Lexington School
Language
View Original
Spanish
Cantonese
French
German
Italian
Tagalog
Vietnamese
Korean
Russian
Hindi
Search
Login
Guest
Admin
Lexington City Schools
Be Somebody
Equitable Opportunities for All
Email Login
Tech Request
{1}
##LOC[OK]##
{1}
##LOC[OK]##
##LOC[Cancel]##
{1}
##LOC[OK]##
##LOC[Cancel]##
MENU
Home
District Information
About Us
About Lexington, NC
Employment Opportunities
Moving to LCS
LCS Opportunity Culture - Extending the Reach
Community Resource Calendar
Connect with LCS
Jacket Academic Boosters
Project Potential
Volunteer in Our Schools
Board Meeting Dates
Communities in Schools
DCCC Talent Search
Facility Usage Requests
Data & Reports
2017-18 Financial Statements
Read to Achieve Report 2019 Grades 1-2
Read to Achieve Report 2019 Grade 3
State Fund Expenditures
Strategic Plan
District & School Report Cards
Our People
Office of the Superintendent
Board of Education
Staff Directory
Departments
District Staff
Parents & Students
Community Services
Jacket Academic Boosters
Project Potential
Community Resource Calendar
Communities in Schools
Information
Board Of Education
Athletics
Menus & Nutrition
NC State Standards
Questions and Concerns
Read to Achieve (RTA) Guidebook
Student Insurance
Technology Responsible Use Policy
Volunteer in Our Schools
Homeless Education Program McKinney-Vento
Driver's Education
STUDENT DRESS CODE
Calendars
Student Code of Conduct
Parental & Family Engagement Policy
Assessment Information
School Board Policy
Curriculum
Tools
Parent Portal
School Messenger
RC-RI Student Login
Online Safety, Social Media, and More
IAM for Students
Teaching & Learning
Curriculum
Secondary
Curriculum Overview
Elementary
Resources
Technology Knowledgebase & Quicktips
HMH SAM
Online Safety Lessons for Students
Instructional Technology & Support
IAM Login
Special Programs
Academically or Intellectually Gifted (AIG)
Credit by Demonstrated Mastery
Title I
Driver's Education
English as a Second Language (ESL)
Exceptional Children (EC)
Schools
Elementary
Charles England Elementary
Pickett Elementary
South Lexington Elementary
Southwest Elementary
South Lexington Developmental Center
High School
Lexington Senior High
Middle School
Lexington Middle School
Employees
Employee Benefits
NC Retirement System Information and ORBIT Login
ORBIT Registration Instructions
Professional Liability Insurance
Retirement
Workmen's Compensation
Insurance
Employee Resources
THE EDUCATOR HIVE: Professional Learning Opportunities
NC Public School Benefits & Employment Policy Manual
Professional Organizations
2019-2020 Educator Calendar
Staff Forms
Tuition Reimbursement
Cyber Security Awareness
License and Staff Development Info
BYOT Request
Technology Knowledgebase & Quicktips
Homebase Maintenance Weekends
New Hire Login Information
The Friday Institute Online Prof. Learning for Educators
Beginning Teacher Support Program
LCS Employee Handbook
School Board Policy
NC Educator Effectiveness System Resources
Employee Tools
Employee Portal
Employee Portal Instructions
EVAAS
Staff Development Activity Proposal
Maintenance Work Order Request
Payroll & Purchasing
Pay Dates
NC Salary Schedule
Home
District Information
2017-18 Financial Statements
About Lexington, NC
Board of Education
Board Meeting Dates
Communities in Schools
DCCC Talent Search
Departments
District & School Report Cards
District Staff
Facility Usage Requests
Employment Opportunities
Jacket Academic Boosters
Moving to LCS
Office of the Superintendent
Project Potential
Read to Achieve Report 2019 Grades 1-2
Read to Achieve Report 2019 Grade 3
Staff Directory
State Fund Expenditures
Strategic Plan
Volunteer in Our Schools
LCS Opportunity Culture - Extending the Reach
Community Resource Calendar
Parents & Students
Board Of Education
Athletics
Calendars
School Board Policy
Communities in Schools
Curriculum
IAM for Students
Menus & Nutrition
NC State Standards
Jacket Academic Boosters
Parent Portal
Project Potential
Questions and Concerns
Read to Achieve (RTA) Guidebook
School Messenger
Student Insurance
Technology Responsible Use Policy
Volunteer in Our Schools
RC-RI Student Login
Homeless Education Program McKinney-Vento
Driver's Education
Online Safety, Social Media, and More
STUDENT DRESS CODE
Student Code of Conduct
Parental & Family Engagement Policy
Community Resource Calendar
Assessment Information
Teaching & Learning
Academically or Intellectually Gifted (AIG)
Credit by Demonstrated Mastery
Curriculum Overview
Driver's Education
Elementary
English as a Second Language (ESL)
Exceptional Children (EC)
Instructional Technology & Support
IAM Login
Secondary
Title I
Technology Knowledgebase & Quicktips
HMH SAM
Online Safety Lessons for Students
Schools
Charles England Elementary
Pickett Elementary
South Lexington Elementary
Southwest Elementary
South Lexington Developmental Center
Lexington Middle School
Lexington Senior High
Employees
Employee Portal
EVAAS
Insurance
LCS Employee Handbook
School Board Policy
NC Salary Schedule
NC Educator Effectiveness System Resources
THE EDUCATOR HIVE: Professional Learning Opportunities
NC Public School Benefits & Employment Policy Manual
NC Retirement System Information and ORBIT Login
ORBIT Registration Instructions
Pay Dates
Professional Organizations
Professional Liability Insurance
Retirement
2019-2020 Educator Calendar
Staff Forms
Tuition Reimbursement
Workmen's Compensation
Employee Portal Instructions
Cyber Security Awareness
License and Staff Development Info
BYOT Request
Technology Knowledgebase & Quicktips
Homebase Maintenance Weekends
New Hire Login Information
Staff Development Activity Proposal
Maintenance Work Order Request
The Friday Institute Online Prof. Learning for Educators
Beginning Teacher Support Program
Phishing Attacks
Lexington City Schools
»
Employees
»
Cyber Security Awareness
»
Phishing Attacks
Be the "phish" that got away!
What is a phishing attack?
Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.
These attacks can even appear to come from a colleague or friend you know.
Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as:
• natural disasters
• epidemics and health scares (e.g., H1N1)
• economic concerns (e.g., IRS scams)
• major political elections
• holidays
They may also appear to come from internal departments or of an urgent nature:
• Help Desk Notice
This phish is an example of how poorly most culprits have taken steps to disguise the message - it is often the case that phishing messages are originally drafted for another school or school district. If it came from lexcs it would have your ticket number and the lexcs domain included and be related to an issue you recently reported.
• Google Docs Download (in the subject line)
This phish example attempts to trick the recipient into clicking on a link to a malicious website by purporting to be a link to download a Google doc.
• Urgent
Any email designated as Urgent followed by a link enclosed in the email should be considered suspicious. This is a common means of getting the recipient to respond quickly before thinking it through.
How do you avoid being a victim?
• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, verify his or her identity directly with the company.
• Do not provide personal information about your organization, including its structure or networks, unless you are certain of a person's authority to have the information.
• Do NOT reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email. IF YOU ARE ASKED FOR PERSONAL INFORMATION, REPORT THIS TO YOUR SUPERVISOR...even if the request appears to be coming from your supervisor. You should personally speak with that supervisor and make him/her aware of the request.(See
Protecting Your Privacy
for more information.)
• Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
• If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly or the sender directly (if you know the sender). Do NOT use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the
Anti-Phishing Working Group
.
What do you do if you think you are a victim?
• If you believe you might have revealed sensitive information about your organization/department, report it to the tech department immediately. They can be alert for any suspicious or unusual activity.
• Immediately change any passwords you might have revealed. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
In the links below are some phishing emails sent to some of our LCS employees.
Please take the time to look at each one. Some seem very legitimate, such as requests for licensure information or an email that appears to be coming from GMAIL directly. When in doubt, personally confirm the legitimacy of the request with the company or sender directly...and never by replying to that same sender via the contact info they provide.
Example 1
Example 2
Example 3
Example 4
Example 5
Example 6
Example 7