From the Global Information Security Team
EDUCATE. MITIGATE. SECURE.
These days, it's possible to use your phone — and sometimes just your voice — to control everything from your TV to your lights, your thermostat and shades, even your car or medical device.
The amount of information collected by these smart devices is staggering. A Federal Trade Commission report this summer concluded that just 10,000 households can generate 150 million discrete data points every day.
What new powerful insights into your personal life will a company have when its entertainment system can track you in your car, a smart vacuum cleaner knows your home's dimensions, and a smart watch monitors your physical activity?
Read about some of the surprising cases where hackers have stolen valuable personal data by accessing smart devices…and what you can do to protect yourself.
Click on the dryer to read more about
appliances that spy and how you can stop them.
Watch this video about popular smartphone apps
that track your every move.
> How did cyber thieves manage to hack HBO and steal all those shows and executive emails? Cyber expert Roderick Jones says it's probably because HBO computers aren't running the latest versions of Windows.
> So, Windows users: make sure you update your home computer's operating system to the latest version, released earlier this month. Here's how.
> Pop star Ariana Grande's Instagram account was hacked recently, exposing her 111 million followers to messages from fraudsters. Solution: enable two-factor authentication.
Now, here's good news. You're in line for a tax refund!
All you have to do is click and confirm where they should send the money.
Sounds too good to be true. Is it?
Move the slider from left to right to see.
Click on a link below to download our Tip-of-the-Month September calendar. Choose the link that is closest to the size of your monitor.
One last thing...
There is one thing that cyber criminals do not want you to know: they cannot be successful without your cooperation.
Having the right technology is essential and important. Technology provides a good barrier to the efforts of those trying to breach our network border. Through the use of such resources as antivirus, firewall, encryption or data loss prevention software, we provide a fortress of protection for our sensitive data. But our efforts cannot and do not stop there. This month we turn our attention to what is known in the IS industry as “Securing the Human,” because even the most state-of-the-art technology can be rendered ineffective in the hands of an inattentive or uninformed person.
Someone reading this message believes that they are not a target of cyber criminals and it is that belief that exposes us to tremendous risk. If you use email. If you have a social media account. If you own a mobile device. If you browse the internet at home or at work, you are a target and you are vulnerable. The cybercriminal knows it. This is why at Realogy we not only invest in technology that will secure us, but we invest in our most valuable asset and our first line of defense: You.
Through the daily practice of implementing what you learn from (1) Our library of information security courses at our MyLearning Information Security page, (2) Our Information Security Newsletter posted bi-weekly in AtHome, and (3) The varied courses we offer in-person and via WebEx, you continue to defend yourself and us against the would-be hackers, social engineers, and phishers.
Remember, every day you have the choice to be Realogy’s greatest asset or our weakest link.
SVP, Global Chief Information Security Officer, Nashira W. Layade
In the upcoming edition of cyber security news:
(Headline for the edition you choose to use)
Video © 2015 The Guardian; Used with permission
Smart toy photo in cyber quiz courtesy WSB TV
Desktop Wallpaper Photo © 2017 Garry Ridsdale
Cartoon: Eric Lewis/The New Yorker Collection/The Cartoon Bank
Original content and design © 2017 Aware Force LLC
Aware Force name and trademark © 2017 Aware Force LLC