What to Do Monday

Your Cybersecurity Action Checklist

Cybersecurity for Early Childhood Professionals

Institute for Childhood Preparedness

From Learning
to Doing

Why This Checklist Matters

You just completed a course on cybersecurity for early childhood programs. Now it is time to put that knowledge into action.

This checklist gives you specific steps you can take Monday morning to strengthen your digital security. No advanced technical skills needed.

Pick 3 to 5 actions to start. You do not have to do everything at once.

Passwords and Access Security

Week 1 Priority

Change Default Passwords

Update passwords on program computers, routers, and accounts that still use factory defaults.

Create Strong Passwords

Use at least 12 characters mixing uppercase, lowercase, numbers, and symbols. Try passphrases.

Turn On Two Factor Authentication

Enable 2FA on email, banking, and enrollment systems holding sensitive family or child data.

Stop Sharing Passwords

Give each staff member their own login. Shared passwords make it impossible to track access.

Phishing and Email Safety

Week 1 Priority

Learn the Warning Signs

Post a reference near shared computers: urgent language, misspelled senders, unexpected attachments, requests for passwords.

Verify Before You Click

If an email asks for money or sensitive info, call the sender at a number you look up independently.

Establish a Reporting Process

Create a simple way for staff to report suspicious emails, like forwarding to a designated address.

Practice as a Team

Show real phishing examples at a staff meeting. Walk through the red flags together so everyone knows what to look for.

Protecting Sensitive Information

Week 2

Audit Where Family Data Lives

List every place you store personal info: enrollment forms, attendance apps, email, file cabinets, cloud drives.

Lock Down Physical Access

Lock file cabinets. Set computers to auto lock after 5 minutes. Position screens away from visitors.

Review Who Has Access

Check who can access enrollment records, payments, and family info. Remove access for anyone who no longer needs it.

Secure Your Wi-Fi Network

Change the router password. Use WPA3/WPA2. Create a separate guest network for visitors.

Social Media and Mobile Devices

Week 2

Review Social Media Policies

Create or update a written policy on what staff can post about children and families. Have everyone sign it.

Audit Your Online Presence

Search your program name online. Remove anything that reveals sensitive details about children or your facility.

Restart Devices Daily

Power off mobile devices for 5 minutes each day. This shuts down malicious apps running in the background.

Update Everything

Run software updates on all phones, tablets, and computers. Turn on automatic updates. Outdated software is an easy way in.

AI Threats and Keeping Kids Safe Online

Week 3

Be Skeptical of Voice and Video

AI can clone voices and create fake videos. Verify unusual requests through a separate channel before acting.

Talk to Parents About Online Safety

Send a note to parents with tips on screen time, parental controls, and discussing internet safety at home.

Set Up Parental Controls on Devices

Enable parental controls on tablets and computers children use. Install content filters. Check settings monthly.

Stay Current on Emerging Threats

Follow ICP for updates. Schedule a 15 minute monthly staff check-in to share what you have learned.

If Something Goes Wrong

Post This Now
1
Change all passwords immediately Start with email, banking, and enrollment systems. Do not reuse compromised passwords.
2
Assess what was accessed Check login history, email forwarding rules, and recent account activity.
3
Set up fraud alerts Contact your bank and set up credit monitoring for the program and affected individuals.
4
Enable two factor authentication Add 2FA to every account involved. This prevents re-entry even with the password.
5
Document and report Record what happened and when. Report to your licensing agency if child or family data was involved.

Build It Into Your Culture

Ongoing

Hold Short Monthly Trainings

Spend 10 to 15 minutes at a staff meeting each month on one cybersecurity topic. Review a recent scam or practice spotting phishing.

Make Security Part of Onboarding

Add a cybersecurity overview to new hire orientation covering passwords, phishing, and social media policies.

Create a Simple Security Checklist

Post a one page checklist in the office: lock your screen, do not share passwords, verify unusual requests.

Celebrate Good Security Habits

When staff catch a phishing email or follow protocol, recognize it. Positive reinforcement builds a security culture.

Thank You for Attending

We hope you found this presentation useful.
Pick your top 3 actions and start Monday.

Use arrow keys or click to navigate