...
This October we are focusing on current trends and following good security habits.
Reject and Verify
As we wrap up cybersecurity awareness month we leave you with a message that you can use anytime you feel pressured or unsure of a request. Reject and Verify. Watch this video and remember it is a good habit to question any request especially if the request is for money, personal information, or access to your online accounts.
If you missed one of the month's weekly tips just scroll below.
(Vikki Beretta Comedy Sketch - plays on YouTube)
Test your phishing knowledge
Google Phishing quiz - Jigsaw
...
.
...
Phishing and Scams Using AI (Artificial Intelligence)
Last week we saw how Human Error has been identified as the leading reason for most security incidents. This week we look at how AI is now be used to scam you. Phishing doesn't jus happen through email, it can be over Text, Phone and even social media. With the evolving AI scammers are making it harder for you to detect these scams. Watch this NBC news video and see how easy it is to clone someone's voice of a family member, a friend, a co-worker, even your boss. Pay attention to the things that you can do before you get scammed out of your money or personal information.
Tips to prevent being scammed by AI phishing:
DO
- Pay attention - Be skeptical of any request for money or personal information. Anyone's voice can be mimicked.
- Confirm. Do not be fooled. Always confirm by calling the person back on a known number.
- Safe word - Pause for a second and ask a personal question that person would know. What did you have for dinner? Or something that happened the last time you saw them. For family members it could be setting up a secret word or phrase they can use when in distress.
Now for the DON'Ts
- Do not trust caller id number it can be spoofed. This is true for Text messages, Phone calls.
- Do not trust any request for money, gift cards or personal information.
Phishing Scams that come over text can look like this using AI to create better sounding text messages. Do not be fooled.
Some tips on AI Text Scams
Urgent or Threatening Requests: Be skeptical, scammers use urgency to pressure you into giving personal information, buying gift cards, or even sending money.
Unsolicited Requests: Legitimate organizations do not request sensitive information via text messages. Such as unexpected job offers, internships, fines to be paid, or requesting credentials for user accounts.
Suspicious Links: Just as we saw with QR codes, refrain from clicking on links within text messages unless you have confirmed the link is legitimate. Instead, visit the website directly and log in from there.
Don't Respond: Unsure, Do not reply to the message or engage with the sender in any way. If you think the message is legitimate, always confirm by calling the person directly on a known number. For links go directly to their official web site and do not use the link in the text message.
Watch this video on Callback phishing from Wizer as AI increased the bad guys are looking for new ways to trick you.
(Wizer - Callback Phishing and AI - video plays on YouTube)
Human Error vs Sound Judgement?
Continuing with good security habits and using sound judgment. Human Error has been identified as the leading reason for most security incidents. Watch this Mimecast sketch and see where Human Error should be replaced with Sound Judgment. After watching, see if you can reduce Human Error with your day-to-day activities.
Tips on how to reduce Human Error:
DO Know your data. Use added caution to protect data that is sensitive, whether it on paper or digital.
- Pay attention to opening email links or attachments. Make sure it was something you expected, and you know who sent it.
- Be careful not to provide/give away sensitive data. Don't be fooled. Always confirm who you are sending the data to, and it is someone who should be receiving the sensitive data.
Avoid using weak passwords or storing passwords in unreliable places; Such as plain text (word, excel, email, phone, google) or even on sticky notes on the office desk or around the house.
- Use Multifactor for all services that you have access to. (i.e. bank login, personal email, social media, personal cloud storage, etc.)
- Encrypt sensitive data whenever possible. Understand how to encrypt or protect sensitive data.
- Back up and secure important data.
Now for the DON'Ts
- Do not use outdated software:
- Do not ignore software updates.
- Do not download unknown or illegal software they could be malicious or have an adverse impact on your machine.
- Do not plug in insecure devices, like unknown USB storage devices they could contain viruses.
- Do not connect to open public Wi-Fi it could be malicious. Use a VPN (Virtual Private Network) or connect to your own private hot spot.
Phishing - From Social Media to QR Code
...
If you don't take the time to confirm a request is legitimate you could be giving away your information or money to a scammer.
(Emirates NBD 2019)
Scammers also use are public places to take your personal information and money such as using Fake QR Codes. Why? Most people are not aware of the risk in QR codes in public places and trust it is associated with that public service. Places like parking meters, parking garages, and even restaurants. Always verify a QR code before providing any sensitive information when using one. Watch this video from ABC7 Chicago on Fake QR Code TIPS,
(ABC7Chicago plays directly on ABC7 Chicago - may have Ad)
Bottom line for any request is to verify,
If you don't recognize the sender or the message,
- QR - Don't scan the code.
- SMS/Text Message - Don't open the link
- Phone Call - Hang up
Confirm The Source
If you receive a Text Message, Phone Call or QR code from a company you know and trust you should contact them directly to confirm its legitimacy before scanning. For physical QR codes you should check for stickers pasted over a public display.
Spot the phish.
Just like email phishing attempts with be wary of any request via phone, text or QR codes that create a sense of urgency, appeal to your emotions, or have poor grammar.
Review QR code URLs carefully Make sure the URL matches the website you expect to visit before scanning.
Watch out for personal info requests
Don't give out sensitive information, such as login credentials or credit card numbers, to a website you reached through a Email, Text Message or QR code without verify it is legitimate.
Want to see if you can spot a phish?
Visit the google phishing quiz site.
https://phishingquiz.withgoogle.com/
...
...
Suffolk email filters remove most malicious emails but some get through. This is where we need your help to spot phishing and report it.
What you can do when you know or think an email is phishing is to please report the message in Outlook. Reporting a message as phishing updates our filtering and can potentially protect other users' inboxes from the same or similar message.
To report phishing in Outlook online and desktop Outlook on Windows and Mac.
Select the email you want to report as phishing,
then click the Report button in your toolbar,
then select Report phishing.
(You can find the toolbar directly above your inbox which includes commonly used actions like deleting or marking items as read. See the image below)
Can’t find the report button? Depending on your toolbar’s layout, Report may be hidden under a three-dots menu or dropdown menu. Also note you can customize your toolbar to rearrange your toolbar buttons to make it easier in the future to find.
If you are using Outlook mobile app, tap the three-dots menu at the top of the message. In the dropdown menu, tap “Report” then select “Report Phishing"
What’s the difference between junk and phishing and what happens when I report it?
If you have this question, you’re not alone.
“Junk” is another email word for spam or unsolicited unwanted email. Phishing, on the other hand, is malicious email meant to steal or trick you into sharing credentials, personal information, installing malicious software, or taking your money.
When you “Report Junk” the message is moved to your Junk Email folder. You still have access to the email and future similar emails are routed to your Junk Email folder.
When you “Report Phishing” Outlook deletes the message from your inbox and it is reported to our Office 365 environment for tuning our filtering potential new similar bad messages.
Magic Words and Passwords
...
Having a unique long and strong Magic Word (Password) is important. Did you know that a computer can crack an 8-character password in seconds whereas a 14-character password with complexity (upper and lower case, a number, and a special character) takes centuries to crack? You ask, how can anyone remember a long complex Magic Word (Password)? Use a Passphrase. A Passphrase is a string of words, it can be just as simple as 4 random words together to make a memorable Magic Word (Password). Below are tips on how to make it memorable, unique, and strong.
How to create a strong memorable Magic Word (Password)
...




