National Cyber Security Month 2015: Daily Security Awareness Tips



Similar documents
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Malware & Botnets. Botnets

Identity Theft Protection

Learn to protect yourself from Identity Theft. First National Bank can help.

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Cybersecurity Best Practices

STOP. THINK. CONNECT. Online Safety Quiz

Fraud Prevention Tips

10 Quick Tips to Mobile Security

IT Security DO s and DON Ts

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Cyber Security Awareness. Internet Safety Intro.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

BSHSI Security Awareness Training

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

& INTERNET FRAUD

NATIONAL CYBER SECURITY AWARENESS MONTH

Protect yourself online

BE SAFE ONLINE: Lesson Plan

Identity Theft Protection

Preventing identity theft

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Information Security. Annual Education Information Security Mission Health System, Inc.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Internet threats: steps to security for your small business

How-To Guide: Cyber Security. Content Provided by

Retail/Consumer Client. Internet Banking Awareness and Education Program

High Speed Internet - User Guide. Welcome to. your world.

Tips for Banking Online Safely

Online Security Tips

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

General Security Best Practices

Cyber Security. Securing Your Mobile and Online Banking Transactions

Protecting Yourself from Identity Theft

Advice about online security

When Fraud Comes Knocking

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

What are the common online dangers?

Information Security It s Everyone s Responsibility

A Parents' Guide to Cybersecurity

Contents Security Centre

Online Banking Customer Awareness and Education Program

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Information Security It s Everyone s Responsibility

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

IDENTITY THEFT: MINIMIZING YOUR RISK

Remote Access Securing Your Employees Out of the Office

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Safe Practices for Online Banking

How To Protect Your Information From Being Hacked By A Hacker

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

What is Identity Theft?

Business ebanking Fraud Prevention Best Practices

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Protecting Yourself from Identity Theft

Working Practices for Protecting Electronic Information

Remote Deposit Quick Start Guide

Protection from Fraud and Identity Theft

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Customer Awareness for Security and Fraud Prevention

Introduction to Computer Security

Frequently Asked Questions

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

Payment Fraud and Risk Management

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Best Practices Guide to Electronic Banking

Perception and knowledge of IT threats: the consumer s point of view

Deter, Detect, Defend

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Safeguarding Your information and accounts

what you need to know

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Transcription:

National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates. Home computers, laptops, tablets, smart phones, and other personal devices can be vulnerable to the latest threats if they are not frequently updated. Set your computers and devices to automatically download and install operating system updates as they are released. This will ensure that even new threats will not be a risk. October 2 If You Are Suspicious About a Call, Ask For More Information and Report the Incident To IT Security. Anyone can call and ask for information. If you believe that someone is attempting to get sensitive information from you or to get you to complete a task that could lead to a security breach, ask them for their name, number, and what they want. Report the incident to IT security before fulfilling any of their requests. The IT security department will let you know if the request was legitimate. October 3 Identity Theft Can Lead to a Damaged Credit Score. Place Stolen Credit Cards on Fraud Alert with All Three Reporting Agencies. After reporting a stolen credit card to your credit card agency, you should also contact the three national credit reporting agencies to place a fraud alert on your account. Experian, TransUnion and Equifax can freeze your account to ensure that there are no new changes to your credit, such as new accounts being opened in your name. October 4 Network Sharing Can Be Dangerous. Turn Off Sharing When Using Your Laptop in a Public Place. The sharing feature that lets you share music, videos, documents, and printers with other computers in your home can represent a security risk if you use it in a public place. Others could use this feature to view or even alter documents that you have on your computer. When using your laptop in a public location, turn off the sharing feature entirely. October 5 Social Media is Viewable By Anyone. Make Sure Your Opinions are Seen as Your Own, Not the Organization s. Anyone can view your public social media accounts. If you make it known that you work for the organization, put a disclaimer on your social media accounts stating that any opinions you post are your own. Otherwise they could be misinterpreted as the opinions of the organization.

October 6 Phishers May Call Asking For Private Information. Do Not Give Private Information Over The Phone To Someone Who Calls In. If someone calls you asking for sensitive or confidential information, do not give it to them. Instead, ask them to give you a case number or an extension number and then call back through the main number of the company that they claim to work for. If the company cannot find this case number or the extension number does not exist, it is likely that the request was a phishing attempt. October 7 Kids Need Extra Protection Online. Use a Kid-Friendly Browser To Ensure Their Safety. It is important to control the content that your kids can view online. Even children who are not looking for material that is unsuitable for them could still happen upon it. To ensure your child s safety, use kid-friendly software and a kid-friendly browser. These software solutions operate very much like kid-friendly cable by only allowing them to access certain sites that are suitable for their age. October 8 You Should Only Have Access To The Information You Need. Report Any Irregularities To The Help Desk. For security reasons, all employees should only have access to information on a need to know basis. This reduces the possibility of security risks. If you find that you have access to files, documents, or other data that you should not have access to, you should report it to the Help Desk. This will also ensure that you are not responsible for any issues that arise regarding the data. October 9 Ensure That Your Data Is Protected At Home. Encrypt Hard Drives And Password Protect Devices. Your home computer may have sensitive personal information on it as well as confidential organization information. To ensure that your data is protected, you should encrypt your hard drives; this will keep data safe even if the hard drives are lost or stolen. Use a password to protect all of your computers and devices and make sure that all the passwords you use are completely unique. October 10 Business Cards Aren t Always Real. Do Not Trust Someone On The Basis Of A Business Card. Fake business cards may be used by social engineers to gain access to certain areas. If someone gives you a business card, you should still verify the information on the card. Do not take a business card as proof that someone should be allowed to access any confidential information or private areas. If you don t feel right about something, report it.

October 11 Identity Thieves May Use Public Forums. Watch What You Say. Don t let your guard down on public forums. Anything you say may be used by identity thieves. Identity thieves can look through your public forum posts, profiles and social media accounts to create a picture of your identity. They can find your full name, your age, your location, and your profession and they can use all of these items to compromise your identity. Remaining anonymous on the Internet is ideal. October 12 Public WiFi Is Insecure. Do Not Use Banking Websites When On Public WiFi. On public WiFi, any data you transmit could potentially be viewed by someone else. You should not transmit any personal, confidential or sensitive data when you re using a public connection. This includes banking activities, bill paying, and anything else of a financial or private nature. October 13 Do Not Use Email or Instant Messaging to Send or Retransmit Inappropriate Content. Follow the Acceptable Use Rules of Your Organizations for Data Transmission. It might seem like harmless fun to forward an off-color joke or other inappropriate material that a friend has sent you via email or social media. However, doing so could result in a public relations disaster and even expose your organization to a lawsuit. When in doubt, ask yourself what your supervisor would think if he or she received a copy of the message you sent. October 14 Change Your Password as Often as Possible. Rigorous Password Management Helps Protect Your Organization s Confidential Information. Your IT department will spell out the rules for password management and you need to follow their guidance to protect the safety of your organization s computer network. Change your password as often as the IT department mandates. The longer you go between new passwords, the more opportunities hackers have to crack (guess) your password. October 15 Use Anti-spyware Software to Help Prevent Hackers from Monitoring Your Computer Activity. Spyware often masquerades as a game or a free and useful utility to help you work more efficiently. But once installed, it will gather your keystrokes, usernames, and passwords, keeping track of what you write and sending the information back to criminals without your knowledge. Ensure your antivirus software also protects against spyware and is always kept up to date.

October 16 Keep Your Data Secured From Cyber Criminals Through Privacy, Encryption and Good Habits. Cyber criminals are usually motivated by data itself; they aren t usually attempting to obtain physical assets, merely information. For that reason, you should always take precautions to protect your organization s data. Ensure that data is only accessed by those that need to use it, encrypt all of your data regardless of format, and keep good password habits such as changing your password often and always using different passwords for different applications. October 17 Protect PII by Only Sharing Information With Those That Need to Know. It s extremely important to protect the Personally Identifiable Information (PII) of your clients; in some areas, it s even a requirement. Personally Identifiable Information includes, but isn t limited to, names, addresses, dates of birth, and other biographical information. You can protect PII by operating on a need to know basis; only release Personally Identifiable Information to those that have a requirement and authorization for that information. This will reduce your overall risk. October 18 Get Prior Approval Before Accessing Workplace Information on a Personal Computer or Mobile Device. Sometimes you need to work from home, but this can sometimes represent a security risk if not handled correctly. To reduce your risk, always request prior authorization before working from home and only work from devices that have been approved for use, such as a work laptop. Follow your organization s security protocols, such as never logging in from a public computer and keeping your computer or device locked when not in use. October 19 If Your ATM PIN Has Been Compromised, Your Accounts Have Likely Been Compromised. Take Immediate Action to Recover Your Accounts. If your ATM PIN stops working at either an ATM or a transaction counter, you should immediately call your bank to change your login information, your PIN and any other relevant information. Call all three of the credit bureaus to have your account red flagged and check the transactional data on all of your accounts. If someone has compromised your ATM PIN, it is very likely that they have also compromised other financial information. October 20 Social Media Apps May Broadcast Your Location. Don't Give Apps Permission to Post This Sensitive Information. There are many social media apps that may broadcast your location. On a smartphone, these apps will usually request access to your GPS coordinates. On the web, however, these apps may

simply pick up your location from your IP address and never ask for permission. Be very cautious about this. Someone could use your location to stalk you. They could also use this information to determine when you are not home so they can rob you. Avoid the temptation to "check in" on social media. October 21 Old Browser Plugins May Have Security Vulnerabilities. Update Them Regularly To Protect Your Home Computer. Browser plugins, such as Flash, Java, and Acrobat, may become out of date and represent a security risk. Update them on a regular basis or set them to update themselves automatically to ensure that your home computer is protected. Restart your browser after updating any of these plugins to ensure that the updates have been completed. October 22 Friends May Be Unwitting Participants In Scams. Let Your Friends Know Of Any Suspicious Activity On Their Email Accounts. Occasionally, social engineers may use a friend s email address to send out viruses, malware, or phishing attempts. If you receive a suspicious email from a friend, you should avoid clicking on or downloading anything within it. Immediately alert your friend through phone or text regarding the message; they may not be aware of it and the malicious emails may be going out to other friends and colleagues. October 23 Identity Thieves May Test Out Your Accounts With Small Charges. Go Through Your Credit Card Statements Line by Line. Suspicious activity on your credit card or bank account statements may not be large or noticeable. Often, identity thieves will try to steal a small amount of money from many accounts or may test out an account with a small charge before stealing more. Look through your credit card statements carefully and contact your bank immediately if you notice any unauthorized charges--even if the transaction was later reversed. October 24 Keep Yourself Safe When You Are Traveling. Never Transport Items for Others and Keep Your Important Possessions Secure. It s important that you remember not to transport items for others when you travel. However, this doesn t just include bags and other physical items. You shouldn t transport data or information for others either, and you should keep your own vital information and documentation as safe as possible. Keeping copies of documents such as identification will make it more difficult for problems to arise. October 25 Classify, Label and Protect All Documents and Files to Safeguard Them From Malicious

Insiders. Often, a security system may not be effective when keeping data safe because the threat may come from within the organization. To avoid security threats from malicious insiders, you should ensure that all documents and files are properly classified. Classification allows you to ensure that documents are only available to those with certain security credentials; by minimizing those that can access information in the first place, you minimize the overall risk of exposure. October 26 Phishing Emails Sometimes Pose as Queries from Legitimate Businesses. Always Check With the Company Directly and Never Click on Links. Many fake emails, known as phishing emails, pretend that they are from legitimate companies and ask you to click a link to log in or ask you directly for personal information. Rather than trusting these emails, contact the company directly using contact information that you already had previously and ask them if the email is legitimate. Otherwise you may be sending data to someone with malicious intent. If there is a link in the email, go directly to the company s official website rather than clicking on the link. October 27 The Internet Can Be a Dangerous Place. Educating Your Kids Is the Vital First Step Towards Protecting Them. The Internet is now used extensively through the school system, and children are introduced to it at an early age. You can protect your children by setting firm ground rules and educating them about dangers. Let them know what they can and can t do while they re online and ensure that their online time is limited. You can also place the computer in an area of your home that is highly visible. October 28 Cybercriminals Can Listen to Your Internet Activity. Always Use Encryption When Transmitting Sensitive Information. Any time you send or receive data, even thru a website, others may be able to hijack and read this data. To protect yourself, use encrypted signals. Never use a wireless connection that isn t protected and only use websites that use HTTPS when sending confidential information. Use a firewall and keep your security protection on at all times for additional protection. October 29 Your Data May Be Vulnerable to Permanent Loss. Use an External Hard Drive to Backup Your Home Computer. Everyone has important information on their computer. If your hard drive fails or your computer otherwise ceases to work, you could lose essential documents that you need. You can avoid this by keeping an external hard drive that is set to automatically back up your documents. The only downside to this is that it could be damaged by flood, fire, or another

event that could damage your home. Additionally backing up your system to a cloud storage network could avoid this risk. October 30 Cyber Bullying Isn t Just a Matter for School Officials. It s Also a Crime. Report Any Instances of Cyber Bullying to Your Local Authorities. Cyber bullying is a crime. If your child is the target of cyber bullying, you should document everything and contact both your child s school and the local authorities. This will increase the likelihood that the matter will be dealt with in an appropriate and productive way. It will also send a message to your child that they are protected and that what is happening to them is wrong. October 31 Malicious Insiders Are a Serious Threat. Always Use a Password Protected Screen Saver at Work. Many security breaches are internal rather than external. Malicious insiders may be able to access data through your computer at work. Using a password protected screen saver will ensure that your computer cannot be accessed by someone else at work even when you have walked away from your computer. Always lock your computer if you are leaving your desk for any reason and set your screen saver to turn on automatically when your computer has been idled for any length of time.