• One in four people have accidentally installed malware from links on social media

  • Over half the people on social media have been phished from links on social media

  • One in five of us has had a social media account hacked by a cybercriminal who then poses as us

  • Nearly half accept friend requests from people we don’t know


Stats: Norton, Barracuda

Listen to his story.        


John is devoting his life to helping others avoid cyber crime.

Here is his advice about using social media safely.

Begin re-claiming your identity

now, before something happens

Always remember who can view what you post.

Those who are apt to suffer cyber crime on social media are...

Click on the arrows above to listen.

Visit his website at www.sileo.com.

From the Global Information Security Team


Late June 2017

> The popular teen social media app Snapchat has added a setting where users' locations are automatically displayed whenever they log in. Consider disabling this feature by turning on "ghost mode".

> Gmail users: beginning later this year, Google will stop scanning your emails for keywords they can then use to serve you targeted advertising.

>  This fall, Girl Scouts will be able to earn a cybersecurity badge for learning about data security, privacy and protecting themselves online.

An email arrives saying you successfully cancelled an order from Amazon.

Except you never placed the order to begin with.


Use the slider below to see what's going on.

If you respond to the email,

the crooks will ask for your credit card information

and Amazon password.

Click on a link below to download our Tip-of-the-Month July calendar. Choose the link that is closest to the size of your monitor.

One last thing...

The news is replete with stories about them.  Headlines report on the victims and the repercussions.  If you have ever been a victim, you remember the fear it engenders. In this month’s newsletter, we turn our focus to hacking, this time in the context of social media.


In its simplest understanding, hacking generally referred to a skilled computer expert who would use his/her knowledge to tackle a technology problem. Those were the good guys. But in our day and age, and with growing frequency, hacking is mostly synonymous with bad actors who invade computer networks and systems to distribute all types of malware that give them control of your computer and access to all your information resources.


While we are all susceptible to hacking, there are still ways to make yourself less vulnerable to cyber criminals, found in methods you have heard before, but are worth repeating:


  • Though it seems convenient, do not link accounts; if you are ever asked to sign in using Twitter or Facebook or other social media, decline and sign in the standard way with a separate ID and password

  • Allow the automatic updates from IT that install the latest operating system (OS) and anti-virus software on your work computer; or on  your home computer, make sure you update your OS and other software frequently

  • For remote connections use Realogy’s virtual private network (VPN) rather than an open Wi-Fi to connect to our network

  • Password protect each of your devices with a different, strong password, and change them frequently and employ the same practice for each of your online accounts

  • Ignore alarmist webpages that announce there are “critical errors” on your computer; these messages come from scammers attempting to remotely take over your computer


Finally, in the event you find your computer or device behaving in strange ways, or displaying some of the signs of hacking like fake antivirus messages, unwanted browser toolbars that appear or redirected internet searches, contact the IT Help Desk immediately. A compromised computer can never be fully trusted again until IT triage steps are performed.

SVP, Global Chief Information Security Officer, Nashira W. Layade

In the upcoming edition of cyber security news:
Keeping your kids safer online

John Sileo interview courtesy of the Sileo Group

Cartoon © 2016 marketoonist.com

Original content and design © 2017 Aware Force LLC


Aware Force name and trademark © 2017 Aware Force LLC