Being aware and educated is critical to managing and protecting your data. Computers, smartphones and tablets can all be at risk from cyber attacks.
Cyber Security Matters
Keep in mind that:
Official emails will only be sent from @email.
IT will never ask you for your password.
If you suspect suspicious emails, report to IT Services immediately or "when in doubt, throw it out."
Protect Your Devices
Sophos Home Free Antivirus Protection. Features include:
Predictive Artificial Intelligence (AI) Threat Detection
Parental website filtering
Protects up to three devices, including Windows PC and MacOS
Windows system requirements: Windows 7, Windows 8/8.1 or Windows 10, minimum 1GB of free disk space, minimum 1GB of RAM
Get your FREE copy.
Don’t click on a link you weren’t expecting.
Don’t work, shop or bank on public Wi-Fi.
Don’t post sensitive or personal information.
Don’t use only one password.
Use common sense.
Think before you click.
Choose strong passwords.
Become your own human firewall.
Understanding the threat landscape is the first step in becoming part of our human firewall.
Social engineering: The art of manipulating, influencing or deceiving you in order to get you to take some action that isn’t in your own best interest or the best interest of the organization. For example, plugging in an infected USB device into your computer. The hacker may use the phone, email, postal service or direct contact to you to trick you. Phishing and spear phishing are forms of social engineering.
File types: You should know that not all file types are equal or safe. The only safe file type is .txt.
Malware: “Malicious software” is an umbrella term for all the software out there that is being used by cybercriminals to spy on you and steal your information.
Websites: Any website is potentially dangerous. Gambling or porn sites or sites that offer free downloads can be infected with malicious advertising and you don’t even have to click on the site to be compromised.
Spear phishing: A small, focused attack via email on a particular person or organization.
Phishing: Disguised emails from your bank, realtor or even police station. Once you click on a link to open the email or attachment to get a closer look, you’ve been infected with malware.
Smartphones: Cybercriminals are trying hard to infect your smartphone. They use text links, tweets or websites that are optimized for mobile phones to make you think the link is from someone you know. All your confidential data, including your identity, can be compromised.
Ransomware is malicious software that locks or encrypts your organization’s computer files or your mobile device. Typically, ransoms demand a fee to unlock the infected computers and have a deadline of one week.
Fact: Ransomware is one of the most profitable criminal business models in the history of malicious computer software, often referred to as “malware.”
Fact: Last year saw over 40,000 attacks per day with ransomware hiding in over 40% of email spam.
Fact: 91% of cyberattacks start with phishing emails.
Find out about red flags to watch out for in your inbox.