District Operations

Phishing Awareness Program

Test Your Exposure to Phishing

The Learning Technology Center (LTC) offers a unique opportunity for Illinois public school districts to enhance their cybersecurity measures through a comprehensive Phishing Awareness program.

This free service is designed to simulate phishing attacks, a common cyber threat, to educate district employees on detecting and preventing such risks. Participating districts will receive a detailed assessment of their susceptibility to phishing, enabling targeted improvements in their cybersecurity training.

Our Phishing Campaigns

The Phishing Awareness program by the LTC involves sending simulated phishing emails to district employees.

These emails are crafted to resemble real phishing attempts, complete with persuasive text and graphics, to lure recipients into clicking on a malicious link. However, instead of posing a real threat, clicking the link redirects the user to a page that educates them about the dangers of phishing and offers tips on how to avoid such scams in the future.

After the campaign concludes, the LTC provides a report to the district, highlighting which employees clicked the link, indicating a need for further cybersecurity education.

Eligibility and How to Get Started

This program is available to all public PK-12 school districts in Illinois, with each district eligible for one free phishing campaign per year. These campaigns are offered on a first-come, first-serve basis, with the option to purchase additional campaigns at a low cost.

Districts interested in this program should:

  1. Contact the LTC at support@ltcillinois.org to initiate the request.
  2. Approve a preliminary email from PhishingBox, which verifies the district’s domain for the phishing simulation.
  3. Provide a list of campaign targets (faculty and staff names and email addresses) via a spreadsheet. Note: The program is currently limited to testing faculty and staff, not students.
  4. Whitelist the LTC’s IP addresses (64.191.166.196 and 64.191.166.197) to ensure the phishing simulation emails are received.