Cyber Tips
by Suzette Manduley
Copa Style Magazine's Tech Columnist
During the month of October 2017, the U.S. government and organizations large and small across the United States will be focused on promoting a culture of cyber security and personal responsibility 24/7/365 – in the workplace, at home and on the go – on all computing devices.
We live in a world that now includes the “Internet of Things” (IOT), ever-increasing attacks and exploitation of our digital and physical information. Cyber attacks threaten all of our professional, personal and private information – on and off-duty. As companies move more business operations online, and more and more people are teleworking, cybercriminals are looking to take advantage of unsuspecting employees to gain access to valuable company and personal information. Often, the weakest link in network cyber security is the human using a computer for work (or an inattentive family member).
Strengthening your cybersecurity posture is critical, as YOU are the FIRST line of defense! It is imperative for you to remain informed and vigilant in daily practices to protect your own information your information technology (IT) systems.
Here are 10 simple steps you can take to protect information and devices at work, on the go and at home:
1. Make your passwords complex. Create long, complex passwords or passphrases (for all devices) that adhere to company/agency policy – and at home – to common sense - and that include may combination of upper and lowercase letters, numbers, and symbols.
2. Beware of phishing emails. Don’t open emails, links, or attachments from strangers. Phishing attacks use email or malicious websites to infect your machine with malware in order to collect personal and financial information. Keep in mind: If in doubt (of clicking or opening), don’t.
3. Monitor accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you have been compromised.
4. Keep a clean machine. Install updates for apps and update the security software on all of your Internet-connected devices as soon as updates are available. Keeping the software up to date will prevent cybercriminals from being able to take advantage of known vulnerabilities.
5. Limit the amount of personal information you post online – and use privacy settings to avoid sharing information widely. Review often and go back and edit/delete potentially compromising detail. Never say you are NOT at home. Rather say, “away from the computer right now,” and don’t specify for how long.
6. Encrypt sensitive information. If you have information that needs to be protected, encrypt it. Applications that “zip” files usually offer the option of adding a password. If you use a laptop, external hard drive, USB flash drive or mobile phone, make sure that encryption is being used.
7. Use caution when sending sensitive information. Before you send sensitive information to someone, ensure you understand the risks involved. Confirm the recipient is a trusted individual and that you have encrypted the sensitive information prior to sending it.
8. Make frequent backups of important files. Find an appropriate storage device capable of storing all of the data and programs you need to backup – at least twice the size of the hard drive. An external hard drive is best and keep it separate from your computer when not in use.
9. Protect your laptop, desktop, notepad, smartphones and mobile devices. Don’t let them get stolen either. Consider the actual physical surroundings where you keep your devices – like your home, your car, your locker, your back pocket and your purse. Keep them safe or keep them with you (and safe).
10. Report all suspicious activity. At work, if something seems off or unusual with any computing device you use for work, stop what you are doing report it immediately to your IT Help Desk or Security Department. At home, know what to do or where to go for help.
Cybersecurity is a critical aspect of everyday life and business operations, not just a once-a year training requirement. Everyone is responsible for integrating cybersecurity risk management into assignments, projects and even off-duty activities. I encourage you all to take advantage of these tips and help promote a culture of cybersecurity all around you.
Remember – Cybersecurity begins and ends with YOU.
We live in a world that now includes the “Internet of Things” (IOT), ever-increasing attacks and exploitation of our digital and physical information. Cyber attacks threaten all of our professional, personal and private information – on and off-duty. As companies move more business operations online, and more and more people are teleworking, cybercriminals are looking to take advantage of unsuspecting employees to gain access to valuable company and personal information. Often, the weakest link in network cyber security is the human using a computer for work (or an inattentive family member).
Strengthening your cybersecurity posture is critical, as YOU are the FIRST line of defense! It is imperative for you to remain informed and vigilant in daily practices to protect your own information your information technology (IT) systems.
Here are 10 simple steps you can take to protect information and devices at work, on the go and at home:
1. Make your passwords complex. Create long, complex passwords or passphrases (for all devices) that adhere to company/agency policy – and at home – to common sense - and that include may combination of upper and lowercase letters, numbers, and symbols.
2. Beware of phishing emails. Don’t open emails, links, or attachments from strangers. Phishing attacks use email or malicious websites to infect your machine with malware in order to collect personal and financial information. Keep in mind: If in doubt (of clicking or opening), don’t.
3. Monitor accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you have been compromised.
4. Keep a clean machine. Install updates for apps and update the security software on all of your Internet-connected devices as soon as updates are available. Keeping the software up to date will prevent cybercriminals from being able to take advantage of known vulnerabilities.
5. Limit the amount of personal information you post online – and use privacy settings to avoid sharing information widely. Review often and go back and edit/delete potentially compromising detail. Never say you are NOT at home. Rather say, “away from the computer right now,” and don’t specify for how long.
6. Encrypt sensitive information. If you have information that needs to be protected, encrypt it. Applications that “zip” files usually offer the option of adding a password. If you use a laptop, external hard drive, USB flash drive or mobile phone, make sure that encryption is being used.
7. Use caution when sending sensitive information. Before you send sensitive information to someone, ensure you understand the risks involved. Confirm the recipient is a trusted individual and that you have encrypted the sensitive information prior to sending it.
8. Make frequent backups of important files. Find an appropriate storage device capable of storing all of the data and programs you need to backup – at least twice the size of the hard drive. An external hard drive is best and keep it separate from your computer when not in use.
9. Protect your laptop, desktop, notepad, smartphones and mobile devices. Don’t let them get stolen either. Consider the actual physical surroundings where you keep your devices – like your home, your car, your locker, your back pocket and your purse. Keep them safe or keep them with you (and safe).
10. Report all suspicious activity. At work, if something seems off or unusual with any computing device you use for work, stop what you are doing report it immediately to your IT Help Desk or Security Department. At home, know what to do or where to go for help.
Cybersecurity is a critical aspect of everyday life and business operations, not just a once-a year training requirement. Everyone is responsible for integrating cybersecurity risk management into assignments, projects and even off-duty activities. I encourage you all to take advantage of these tips and help promote a culture of cybersecurity all around you.
Remember – Cybersecurity begins and ends with YOU.
~Copa