In observance of October Cyber Security Awareness Month,
five security leaders share what they do to keep themselves
and their families safe online.
< Click on the arrows below to read the slides. >
I use two computers — one that’s not connected to the internet for banking and taxes, and a second computer for going online.
I’m also the password police in our family. I make sure we always change default passwords on electronics.
Senior Director, Cyber Threat Reduction
Source: Aware Force
The Equifax breach has exposed 145 million adults' personal information to hackers.
Learn more about how that will affect you.
Why are "they" hacking us?
This video from PBS NovaLabs provides an explanation.
Cyber security news you should know
> If you’re one of the millions whose home Windows computer is running an application called CCleaner to delete unnecessary files: update it immediately. A version of CCleaner released this summer has malware in it.
> Apple users: make sure your iCloud password is long and hard to guess. Hackers have found a new way to lock users out of their iPhones, iPads and MacBooks if they can guess your iCloud password.
> The most dangerous celebrity to search for online right now is Avril Lavigne. According to the technology company McAfee, her listings are more likely to turn up links to malicious websites than any other celebrity.
Can you catch this phish?
Sure looks like a real notice from UPS.
Similar scams appear to come from FedEx, the post office and others.
Clicking on it could infect your computer.
Move the slider from left to right.
One last thing...
One last thing...
It’s Cyber Security Awareness Month!
All year long, the Global Information Security Team has been encouraging you and educating you to think about security and to adopt safe habits.
We want you to remember that information security is a 365/24/7 effort. Here’s why:
There are persons who are professionals in creating illusions that trick us and make us believe what we see is reality. They are called magicians. But there are also persons who use deceptive tactics to gain some personal advantage, usually access to our information or financial resources. They are called cyber criminals.
You know some of the tactics of cyber criminals. You may be most familiar with phishing, the distribution of spam email to entice a reply that ultimately gives criminals access to perform their fraudulent activities. But there are other ways these bad actors try to deceive us into giving away sensitive information. They may duplicate an email address or a website, or so it may seem, such that the design and even its URL, web address, may look the same. Once you click to visit the website, even though it is a fraud, the information you enter is real. It is captured and the thief will use it to his/her advantage to sign onto the real website and steal money, credentials or other valuable information.
The best way to prevent yourself from becoming a victim of a spoofed website is to never click on a hyperlink to get to a website unless you are CERTAIN that it is a legitimate link. Rather, type in the web address of the website you are hoping to access.
Always look closely at the sender’s email address to be sure it is someone you know and trust. Oftentimes, email addresses are spoofed by just one character or intentionally misspelled to deceive the inattentive recipient.
Be aware. Be vigilant. And report any suspicious events to your local IT Help Desk immediately.
Don’t ever give cyber criminals a reason to celebrate…but especially in this month!
They never stop. Neither should we.
SVP, Global Chief Information Security Officer, Nashira W. Layade
In the upcoming edition of cyber security news:
With the Equifax breach, is your privacy dead?
The Secret Lives of Hackers downloaded from PBS LearningMedia.
Rights to use this asset expire on 08/21/2024.
Asset Copyright ©2014 WGBH Educational Foundation. All Rights Reserved.
Credits: Produced by NOVA
Alex Rosenthal, Writer/Director/Producer
Nick Hilditch, Animator
George S. Zaidan, Narrator
Scorekeepers Music Library, Music
Source: NOVA: The Cybersecurity Lab
Project funded by:
Cartoon: Paul Noth/The New Yorker Collection/The Cartoon Bank
Quiz photos courtesy: Equifax, Pexels, Flickr
Original content and design © 2017 Aware Force LLC
Aware Force name and trademark © 2017 Aware Force LLC