One in four people have accidentally installed malware from links on social media
Over half the people on social media have been phished from links on social media
One in five of us has had a social media account hacked by a cybercriminal who then poses as us
Nearly half accept friend requests from people we don’t know
Stats: Norton, Barracuda
Listen to his story.
John is devoting his life to helping others avoid cyber crime.
Here is his advice about using social media safely.
Begin re-claiming your identity
now, before something happens
Always remember who can view what you post.
Those who are apt to suffer cyber crime on social media are...
From the Global Information Security Team
EDUCATE. MITIGATE. SECURE.
Late June 2017
> Gmail users: beginning later this year, Google will stop scanning your emails for keywords they can then use to serve you targeted advertising.
> This fall, Girl Scouts will be able to earn a cybersecurity badge for learning about data security, privacy and protecting themselves online.
An email arrives saying you successfully cancelled an order from Amazon.
Except you never placed the order to begin with.
Use the slider below to see what's going on.
If you respond to the email,
the crooks will ask for your credit card information
and Amazon password.
Click on a link below to download our Tip-of-the-Month July calendar. Choose the link that is closest to the size of your monitor.
One last thing...
The news is replete with stories about them. Headlines report on the victims and the repercussions. If you have ever been a victim, you remember the fear it engenders. In this month’s newsletter, we turn our focus to hacking, this time in the context of social media.
In its simplest understanding, hacking generally referred to a skilled computer expert who would use his/her knowledge to tackle a technology problem. Those were the good guys. But in our day and age, and with growing frequency, hacking is mostly synonymous with bad actors who invade computer networks and systems to distribute all types of malware that give them control of your computer and access to all your information resources.
While we are all susceptible to hacking, there are still ways to make yourself less vulnerable to cyber criminals, found in methods you have heard before, but are worth repeating:
Though it seems convenient, do not link accounts; if you are ever asked to sign in using Twitter or Facebook or other social media, decline and sign in the standard way with a separate ID and password
Allow the automatic updates from IT that install the latest operating system (OS) and anti-virus software on your work computer; or on your home computer, make sure you update your OS and other software frequently
For remote connections use Realogy’s virtual private network (VPN) rather than an open Wi-Fi to connect to our network
Password protect each of your devices with a different, strong password, and change them frequently and employ the same practice for each of your online accounts
Ignore alarmist webpages that announce there are “critical errors” on your computer; these messages come from scammers attempting to remotely take over your computer
Finally, in the event you find your computer or device behaving in strange ways, or displaying some of the signs of hacking like fake antivirus messages, unwanted browser toolbars that appear or redirected internet searches, contact the IT Help Desk immediately. A compromised computer can never be fully trusted again until IT triage steps are performed.
SVP, Global Chief Information Security Officer, Nashira W. Layade
In the upcoming edition of cyber security news:
Keeping your kids safer online
John Sileo interview courtesy of the Sileo Group
Cartoon © 2016 marketoonist.com
Original content and design © 2017 Aware Force LLC
Aware Force name and trademark © 2017 Aware Force LLC