YOU ARE THE TARGET: Many people mistakenly believe cyber criminals would never target them, that their computer or
information has no value. In reality, individuals like yourself are the primary target. You and your computer are attacked every day. The first step to protecting yourself is realizing you
are under constant attack. Having the resources at our fingertips that the Internet provides will continue
to have a huge impact in how we live our lives. To safeguard our identities, our information, our data,
it is important that we adopt good cyber security habits.
Please come back to this site for new information about cyber security throughout the month of October!
Week #1 - Social Engineering, Phishing Scams, and Browsing Security
Social Engineering - Cyber criminals have learned that the easiest way to get information is to simply ask for it. Social engineering is not a technical attack, it is a psychological attack which exploits your vulnerabilities. To read more information about Social Engineering please visit the following links.
Phishing Scams - Email has become one of the fastest and simplest ways to communicate around the world. As a result, it has also become one of the primary methods cyber criminals will use to attack you on the Internet. To read more information about Phishing Scams please visit the following links.
- Email and IM Security Newsletter
- Email and Phishing Scams
- Identifying Hoaxes
Browsing Security - Your web browser is your primary tool for using the Internet for this like gathering information, online shopping, managing finances, and social networking. Because of this, your browser is also a primary target for cyber criminals. To read more information about Browsing Security please visit the following links.
Week #2 - Institutional Security
Secure Printing - Printing can become a security concern if not done properly. Important documents can easily be picked up off the printer before you arrive.
Wi-Fi Security - Wireless technology makes it simple to connect to the Internet. However, this technology can also make it easier for cyber criminals to monitor and steal your information. To read more information about Wi-Fi Security please visit the following links.
- Do not send critical documents such as: exams, personal information, or anything you wouldn't want someone to see to a shared printer unless you are right there to pick it up.
- If there is a secure printing option available, be sure to use that for documents that are confidential.
- Logging into the printer to then select which jobs to print is the most secure option.
- Using a secure print option can also reduce the waste of prints that are not desired.
Mobile Device Security - Mobile devices have become one of the primary ways people communicate and interact with the Internet. With all of these capabilities come risks. To read more information about Mobile Device Security please visit the following links.
Physical Security - Cyber attacks are the most common attack against your data; however, we must remember that criminals also exist in the real world. Frequently it is simpler for criminals to physically steal information that is not secured. To read more information about Physical Security please visit the following links.
Week #3 - Social Networking
Social networking sites are powerful tools that allow you to communicate with friends and family around the world. However, be careful what you share, how you share it and with whom. To read more information about how to protect yourself please visit the following links.
To get more information now please check out the following websites:StaySafeOnline.org
Federal Trade Commission