Cybersecurity Tips

/Cybersecurity Tips

Top 5 Steps to Work Securely from Home

TOP 5 STEPS TO SECURELY WORK FROM HOME

We know that working from home can be new to some of you, perhaps overwhelming as you adjust to your new environment. One of our goals is to enable you to work as securely as possible from home. Below are five simple steps to working securely. The best part is all of these steps not only help secure your work, but they will make you and your family far more safe as you create a cybersecure home.

1) YOU

First and foremost, technology alone cannot fully protect you – you are the best defense. Attackers have learned that the easiest way to get what they want is to target you, rather than your computer or other devices. If they want your password, work data or control of your computer, they’ll attempt to trick you into giving it to them, often by creating a sense of urgency. For example, they can call you pretending to be Microsoft technical support and claim that your computer is infected. Or perhaps they send you an email warning that a package could not be delivered, fooling you into clicking on a malicious link. The most common indicators of a social engineering attack include:

  • Someone creating a tremendous sense of urgency, often through fear, intimidation, a crisis or an important deadline.
  • Pressure to bypass or ignore security policies or procedures, or an offer too good to be true (no, you did not win the lottery!).
  • A message from a friend or co-worker in which the signature, tone of voice or wording does not sound like them.

ULTIMATELY, THE BEST DEFENSE AGAINST THESE ATTACKS IS YOU.

2) HOME NETWORK

Almost every home network starts with a wireless (often called Wi-Fi) network. This is what enables all of your devices to connect to the Internet. Most home wireless networks are controlled by your Internet router or a separate, dedicated wireless access point. Both work in the same way: by broadcasting wireless signals to which home devices connect. This means securing your wireless network is a key part of protecting your home. We recommend the following steps to secure it:

  • Change the default administrator password: The administrator account is what allows you to configure the settings for your wireless network. An attacker can easily discover the default password that the manufacturer has provided.
  • Allow only people that you trust: Do this by enabling strong security so that only people you trust can connect to your wireless network. Strong security will require a password for anyone to connect to your wireless network. It will encrypt their activity once they are connected.
  • Make passwords strong: The passwords people use to connect to your wireless network must be strong and different from the administrator password. Remember, you only need to enter the password once for each of your devices, as they store and remember the password.

NOT SURE HOW TO DO THESE STEPS? 

Ask your Internet Service Provider, check their website, check the documentation that came with your wireless access point, or refer to the vendor’s website.

3) PASSWORDS

unique passphrase means using a different one for each device or online account. This way if one passphrase is compromised, all of your other accounts and devices are still safe.

CAN’T REMEMBER ALL THOSE PASSPHRASES?

Use a password manager, which is a specialized program that securely stores all your passphrases in an encrypted format (and has lots of other great features, too!). Finally, enable two-step verification (also called two-factor or multi-factor authentication) whenever possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is probably the most important step you can take to protect your online accounts and it’s much easier than you may think.

4) UPDATES

Cyber attackers are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Meanwhile, the companies that created the software for these devices are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates promptly, you make it much harder for someone to hack you. To stay current, simply enable automatic updating whenever possible. This rule applies to almost any technology connected to a network, including not only your work devices but Internet-connected TV’s, baby monitors, security cameras, home routers, gaming consoles or even your car.

MAKE SURE EACH OF YOUR COMPUTERS, MOBILE DEVICES, PROGRAMS AND APPS ARE RUNNING THE LATEST VERSION OF ITS SOFTWARE.

5) KIDS & GUESTS

Something you most likely don’t have to worry about at the office is children, guests or other family members using your work laptop or other work devices.

MAKE SURE FAMILY AND FRIENDS UNDERSTAND THEY CANNOT USE YOUR WORK DEVICES.

They can accidentally erase or modify information, or, perhaps even worse, accidentally infect the device.

ALSO REMEMBER

  • Voice control devices including Google Home, Amazon, Apple, etc should be disabled/removed from the home work area for privacy reasons.  Staff should remove them if you are having Call/Video meetings. Faculty should remove them when teaching over collaborative technologies.
  • Any hard copies of documents should be secured from family and friends just like work devices.  If using a shared, family computer then no documents/logins/passwords should not be saved at all.
  • If using a camera, ensure you are in a private area where no personal/private items are in view or where family/friends will not normally enter into view of the camera.  When possible/available, blur the background.
2020-05-21T15:03:49-04:00March 30th, 2020|Cybersecurity Tips, Working Remotely|

General Internet Security

internet-security


Don’t use lazy passphrases

Never use a password that anyone could guess or work out – a middle name, pet’s name, or favourite football team. Include capital letters, numbers, and punctuation for extra security. Ideally, the best password is one that has so many characters that it could not be guessed by a computer program in a reasonable amount of time, this is a passphrase. Automated guessing in this fashion, known as a “brute force attack”, is one of the most common methods used by individuals that steal information with malicious intent.

For example…
If your preferred password is your pet’s name: “fido”, make a memorable phrase instead: “fido_likes_internet_security”

  • Make your password at least 12 characters in length.
  • Never use the same password for different accounts. If it is compromised, all of your accounts are at risk.

 

Be careful what you post online

  • Everything you write on a social network is public information, so don’t give out any personal details, such as your address, bank details, date of birth, or social security number. That would be the equivalent of shouting the details out of the window. Don’t write that you are going on holiday, as that leaves you vulnerable to burglars.
  • Many employers perform a simple Google search on prospective employees before hiring, so don’t post anything that could damage your chances of getting a job.

 

Important Concepts For A Safer Internet Experience

  • Never open email attachments or click on links from strangers
  • If you do any online banking, follow all security recommendations made by the institution
  • Watch out for email scams
    • Spoof emails are very common, ranging from Nigerian princes asking for a short-term loan to proper-looking companies asking you for personal information; a process called phishing.
    • If you get an official looking email saying there is a problem with your account, forward it to the company in question to get confirmation it’s from them.
    • Most companies will never ask you to tell them your password.
  • Use a firewall, anti-virus program, and anti-spyware program
    • A firewall will stop unauthorized people hacking on to your computer.
    • Anti-virus programs will guard your computer against viruses which could destroy your computer.
    • Anti-spyware will look out for programs such as keyloggers and trojans which spy on your machine use in an attempt to learn passwords or account details.

avast2

2020-02-25T16:45:38-05:00December 17th, 2019|Cybersecurity Tips|

Watch Out For Fake Apps.

Beware! Scammers are now creating fake apps. They trick you into downloading them to your smartphone or tablet, and ask you to load your credit card information in these apps. You can guess what happens next.

Here are 5 things to keep in mind about this Scam of The Week:

  1. Be very judicious in deciding what app to download. Better safe than sorry.
  2. If you *do* decide to download an app, check the reviews first; apps with few reviews or bad reviews are a big Red Flag.
  3. If you receive an email with a link to download a new app, don’t click it. Always go directly to the website of the retailer to download software, or use the AppStore or Google Play.
  4. Don’t link your credit card or give out any personal information to a program unless you are certain you’re dealing with a verified vendor.

 


2020-02-25T16:43:48-05:00December 11th, 2019|Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 30

Keeping Your Personal Information Secure Online

Know who you share your information with. Store and dispose of your personal information securely.

Be Alert to Impersonators

Make sure you know who is getting your personal or financial information. Don’t give out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, and contact them through customer service. Or, call the customer service number listed on your account statement. Ask whether the company really sent a request.

Safely Dispose of Personal Information

Before you dispose of a computer, get rid of all the personal information it stores. Use a wipe utility program to overwrite the entire hard drive.

Before you dispose of a mobile device, check your owner’s manual, the service provider’s website, or the device manufacturer’s website for information on how to delete information permanently, and how to save or transfer information to a new device. Remove the memory or subscriber identity module (SIM) card from a mobile device. Remove the phone book, lists of calls made and received, voicemails, messages sent and received, organizer folders, web search history, and photos.

Encrypt Your Data

Keep your browser secure. To guard your online transactions, use encryption software that scrambles information you send over the internet. A “lock” icon on the status bar of your internet browser means your information will be safe when it’s transmitted. Look for the lock before you send personal or financial information online.

Keep Passwords Private

Use strong passwords with your laptop, credit, bank, and other accounts. Be creative: think of a special phrase and use the first letter of each word as your password. Substitute numbers for some words or letters. For example, “I want to see the Pacific Ocean” could become 1W2CtPo.

Don’t Overshare on Social Networking Sites

If you post too much information about yourself, an identity thief can find information about your life, use it to answer ‘challenge’ questions on your accounts, and get access to your money and personal information. Consider limiting access to your networking page to a small group of people. Never post your full name, Social Security number, address, phone number, or account numbers in publicly accessible sites.

Securing Your Social Security Number

Keep a close hold on your Social Security number and ask questions before deciding to share it. Ask if you can use a different kind of identification. If someone asks you to share your SSN or your child’s, ask:

  • why they need it
  • how it will be used
  • how they will protect it
  • what happens if you don’t share the number

The decision to share is yours. A business may not provide you with a service or benefit if you don’t provide your number. Sometimes you will have to share your number. Your employer and financial institutions need your SSN for wage and tax reporting purposes. A business may ask for your SSN so they can check your credit when you apply for a loan, rent an apartment, or sign up for utility service.

2020-02-22T20:15:20-05:00October 30th, 2019|Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 29

Don’t be Afraid of Multi Factor Authentication

It should be obvious that using multi factor authentication (MFA) helps with cybersecurity because it is a combination of three or more authentication factors: Something you know, something you haveand something you are (biometrics). Unfortunately, MFA still gets a bad rep. While most organizations utilize some form of traditional MFA or 2FA, it is universally hated because it’s a nuisance and frustrating to implement and use.

Is this bias toward convenience hurting companies? You bet! An analysis of recent breaches shows that if there had been additional authentication factors, the breaches probably wouldn’t have happened. There are a multitude of poorly designed MFA programs out there, so it’s no wonder that many companies don’t like utilizing them. With most MFA programs, you need to go through every step of the authentication process every time you need to sign in. This is absolutely a hassle, but it doesn’t have to be that way. In addition, many MFA solutions require you to create one-time passwords (OTP) or tokens every time you sign-in. This is annoying and time consuming for users. Thankfully, there is another way – using your biometrics as part of an MFA solution.

Passwords are Hurting You

Passwords are ancient. They’ve been used for centuries as a way to protect people and information. In the early years of technology, they seemed like the best solution for controlling access to systems with sensitive data.

Over the years, passwords and password encryption methods have become more complex, but so have the skills of hackers. Passwords have accounted for 81 percent of data breaches in the past few years. Computers don’t know when a password has been compromised, it just grants access to whoever enters it. This lack of proof of identity is an obvious flaw in passwords today.

Not being able to prove identity with a password is one thing, but in addition, businesses can’t always monitor employees and users to make sure they are using best practices. Most people use the same or similar passwords for almost all accounts.

2020-02-22T20:15:20-05:00October 29th, 2019|Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 25

Protecting Sensitive Data

The Information Age has brought with it the ability to share, store, and transmit data with the click of a mouse. The risky part of this equation is that storage and transmission of sensitive data across computer systems can be difficult to protect, increasing the need for vigilance.

In the paper world, if a document is marked “Classified” or “Confidential”, we can easily protect it by placing it face-down on our desk when someone walks by that does not have a need to know, lock it in a file cabinet when it is not being used, or when needing to share use a courier or hand-deliver to the appropriate person, and finally when it is no longer needed we can shred it. We need to take these same precautions in the computer world.

Computer systems are complex. They can include operating system software, applications and programs, databases, hardware components, and networks. Each of these elements requires a different method for protecting the data. Adding to the complexity is the dynamism in terms of the way the systems and their parts interact and their requirement for frequent updates to fix bugs or protect against the latest hack attack. All of this collectively underscores the need for each of us to take responsibility to protect the sensitive data we handle.

If you ever have questions about the security of a system or an electronic document you are handling. In general, Information Security professionals suggest that protecting sensitive data requires a combination of people, processes, polices, and technologies.

2020-02-22T20:15:21-05:00October 25th, 2019|Cybersecurity Tips|

What ‘deepfakes’ are and how they may be dangerous

KEY POINTS
  • Anybody who has a computer and access to the internet can technically produce a “deepfake” video, says John Villasenor, professor of electrical engineering at the University of California, Los Angeles.
  • “The technology can be used to make people believe something is real when it is not,” said Peter Singer, cybersecurity and defense focused strategist and senior fellow at New America.

 

A comparison of an original and deepfake video of Facebook CEO Mark Zuckerberg
A comparison of an original and deepfake video of Facebook CEO Mark Zuckerberg.
Elyse Samuels | The Washington Post | Getty Images

Camera apps have become increasingly sophisticated. Users can elongate legs, remove pimples, add on animal ears and now, some can even create false videos that look very real. The technology used to create such digital content has quickly become accessible to the masses, and they are called “deepfakes.”

Deepfakes refer to manipulated videos, or other digital representations produced by sophisticated artificial intelligence, that yield fabricated images and sounds that appear to be real.

Such videos are “becoming increasingly sophisticated and accessible,” wrote John Villasenor, nonresident senior fellow of governance studies at the Center for Technology Innovation at Washington-based public policy organization, the Brookings Institution. “Deepfakes are raising a set of challenging policy, technology, and legal issues.”

The rise of deepfakes and how Facebook, Twitter and Google work to stop them

In fact, anybody who has a computer and access to the internet can technically produce deepfake content, said Villasenor, who is also a professor of electrical engineering at the University of California, Los Angeles.

What are deepfakes?

The word deepfake combines the terms “deep learning” and “fake,” and is a form of artificial intelligence.

In simplistic terms, deepfakes are falsified videos made by means of deep learning, said Paul Barrett, adjunct professor of law at New York University.

Deep learning is “a subset of AI,” and refers to arrangements of algorithms that can learn and make intelligent decisions on their own.

But the danger of that is “the technology can be used to make people believe something is real when it is not,” said Peter Singer, cybersecurity and defense-focused strategist and senior fellow at New America think tank.

Singer is not the only one who’s warned of the dangers of deepfakes.

Villasenor told CNBC the technology “can be used to undermine the reputation of a political candidate by making the candidate appear to say or do things that never actually occurred.”

“They are a powerful new tool for those who might want to (use) misinformation to influence an election,” said Villasenor.

How do deepfakes work?

A deep-learning system can produce a persuasive counterfeit by studying photographs and videos of a target person from multiple angles, and then mimicking its behavior and speech patterns.

Barrett explained that “once a preliminary fake has been produced, a method known as GANs, or generative adversarial networks, makes it more believable. The GANs process seeks to detect flaws in the forgery, leading to improvements addressing the flaws.”

And after multiple rounds of detection and improvement, the deepfake video is completed, said the professor.

According to a MIT technology report, a device that enables deepfakes can be “a perfect weapon for purveyors of fake news who want to influence everything from stock prices to elections.”

In fact, “AI tools are already being used to put pictures of other people’s faces on the bodies of porn stars and put words in the mouths of politicians,” wrote Martin Giles, San Francisco bureau chief of MIT Technology Review in a report.

He said GANs didn’t create this problem, but they’ll make it worse.

How to detect manipulated videos?

While AI can be used to make deepfakes, it can also be used to detect them, Brookings’ Villasenor wrote in February. With the technology becoming accessible to any computer user, more and more researchers are focusing on deepfake detection and looking for a way of regulating it.

Large corporations such as Facebook and Microsoft have taken initiatives to detect and remove deepfake videos. The two companies announced earlier this year that they will be collaborating with top universities across the U.S. to create a large database of fake videos for research, according to Reuters.

“Presently, there are slight visual aspects that are off if you look closer, anything from the ears or eyes not matching to fuzzy borders of the face or too smooth skin to lighting and shadows,” said Singer from New America.

But he said that detecting the “tells” is getting harder and harder as the deepfake technology becomes more advanced and videos look more realistic.

Even as the technology continues to evolve, Villasenor warned that detection techniques “often lag behind the most advanced creation methods.” So the better question is: “Will people be more likely to believe a deepfake or a detection algorithm that flags the video as fabricated?”

2020-02-22T20:16:07-05:00October 24th, 2019|Cyber News, Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 24

Credit Card Fraud

Credit card fraud is the unauthorized use of a credit or debit card, or similar payment tool (ACH, EFT, recurring charge, etc.), to fraudulently obtain money or property. Credit and debit card numbers can be stolen from unsecured websites or can be obtained in an identity theft scheme. Visit the FBI’s Identity Theft webpage for additional information.

Tips for Avoiding Credit Card Fraud:

  • Don’t give out your credit card number online unless the site is secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but provides some assurance.
  • Don’t trust a site just because it claims to be secure.
  • Before using the site, check out the security/encryption software it uses.
  • Make sure you are purchasing merchandise from a reputable source.
  • Do your homework on the individual or company to ensure that they are legitimate.
  • Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.
  • Send an e-mail to the seller to make sure the e-mail address is active, and be wary of those that utilize free e-mail services where a credit card wasn’t required to open the account.
  • Consider not purchasing from sellers who won’t provide you with this type of information.
  • Check with the Better Business Bureau from the seller’s area.
  • Check out other websites regarding this person/company.
  • Don’t judge a person or company by their website; flashy websites can be set up quickly.
  • Be cautious when responding to special investment offers, especially through unsolicited e-mail.
  • Be cautious when dealing with individuals/companies from outside your own country.
  • If possible, purchase items online using your credit card. You can often dispute the charges if something goes wrong.
  • Make sure the transaction is secure when you electronically send your credit card number.
  • Keep a list of all your credit cards and account information along with the card issuer’s contact information. If anything looks suspicious or you lose your credit card(s), contact the card issuer immediately.
2020-02-22T20:15:21-05:00October 24th, 2019|Cybersecurity Tips|