Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The overarching theme for the month is, ‘Own IT. Secure IT. Protect ITDo Your Part. #BeCyberSmart.’ and Suffolk University is proud to support this initiative this October.

Each Week We will post a new tip or video around the theme of 'Own IT. Secure IT. Protect IT.'

Thank you and hope you have enjoyed Cybersecurity Awareness Month.

To wrap up the month we will take a lesson from the 1950’s about being "thoughtful". What does that mean? Well, watch this video and find out why from “Billy” (StaySafeOnline.org)

View file
nameDon t be a Billy.mp4
height250

We hope you had some fun while learning something new about cybersecurity and ways to stay secure.

Own IT.

Update Privacy Settings and limit the Sharing of your Personal Information. Understand at least the basic security settings for all your apps and devices.

...

Create strong, unique passphrases, and do not Re-Use those passwords. Change default passwords for all your devices.

...

October Week Four ( Internet of Things )

Please watch this news video about the Internet of Things and reusing of old passwords. (Inside Edition 2018)

View file
nameIoT News.mp4
height250

More and more of our home devices are smart devices that connect to the internet. These are sometimes called the Internet of Things (IoT) This includes thermostats, door locks, door ringers, coffee machines, smoke alarms and the list is ever-expanding of devices. If you can control them from anywhere, potentially, so can someone else.

SIMPLE TIPS to help protect your digital home:

Remember these THREE things for all your devices:

Change the default Passwords,

Update the device software,

and Understand the Basic Security Settings of your devices.

Set Passwords and Change the Default Password

Secure your Wi-Fi network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username. For more information on your how to protect your Wi-Fi or its security setting visit the manufacturer website.

Not many people know this but there are passwords for most IoT devices. These default passwords set by the manufacturer and if you don’t change them it makes their gadgets easy to hack. Make sure to set a new and strong password (easy for you to remember hard for others to guess). For more information on strong passwords please visit http://wikis.suffolk.edu/display/ITSEC/Strong+Password OR re-watch the Jimmy Kimmel video below from Week 1 about passwords.

Update your Devices Software (sometimes called Firmware)
You need to keep your software up to date. Manufacturers are always releasing new patches for the latest vulnerabilities, so make it a habit to check and install IoT software/firmware updates regularly.

Understand the Basic Security Settings

When look to purchase or begin to use a new device you should read and understand the basic security settings for that device. An easy thing to do is to go to the manufacture website and

With the advent of IoT devices in homes and offices, cybercriminals also develop more cunning ways to exploit them. Be aware of what your device does and always check and understand the setting as we saw with Social Media in Week 3

October Week Three ( Privacy - Social Media )

Please watch this eye-opening video asking people about online privacy and how private they think they are online. (Buzz Feed 2014)

View file
nameSocial Media - How Private are You.mp4
height250

Keeping Social Networking, Privacy Settings, and Mobile Apps Secure

Social networking sites like Facebook, LinkedIn, Instagram, or Snapchat or messaging platforms like Slack, WhatsApp, or Skype allow us to share personal updates while communicating with friends and co-workers across the globe. While these convenient technologies keep us connected, are you sharing too much and who are you sharing it with.

Here are a few tips to help you stay protected online:

...

Keep Social Security numbers, financial account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are and where you aren’t at any given time.

...

Do Your Part. #BeCyberSmart.'


...

October Week One ( Phishing and Passwords )

...


Phishing is still a common and growing event.  Watch this sketch on phishing and scam emails you could receive played out in real life. Maybe after view, you can better spot phishing scams.


View file
namedefenseworks-phish-email-sketch

...

In return, practice the same level of consideration of what you post about your friends and coworkers on your social networking sites. It would be good practice to ask them if you have their permission to post a picture or share details you have of them.

...

For more information on some common social media apps and their privacy settings:

Facebook privacy settings https://www.facebook.com/help/325807937506242?ref=tos

Twitter privacy settings https://help.twitter.com/en/safety-and-security

SnapChat privacy settings https://support.snapchat.com/en-US/a/privacy-settings2

October Week Two ( Phishing )

Please watch a catchy phishing video twist on Shaggy's song "It wasn't me" (Emirates NBD 2019)

View file
namePhishing -It Wasnt Me .mp4
height250

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to respond to, click on a link, or open an attachment that infects their computers, creating vulnerability to attacks. 

Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers.
When users respond with the information or click on a link, attackers use it to access users’ accounts.


HOW CRIMINALS LURE YOU IN
The following messages are examples of what attackers may email or text when phishing for sensitive information:;

  • "Are you available? Can you buy me some Gift Cards? I will pay you back"
  • "Need a Virtual Assistant. I will send you a Check now... or for the exchange of Gift Cards"
  • “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below, and confirm your identity.”
  • “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
  • “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”

To see examples of actual phishing emails, and steps to take if you believe you received a phishing email, please visit https://wikis.suffolk.edu/display/ITSEC/Recent+Phishing+Attempts

...

Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email.

...


Passwords. Old but good one. Let's make strong memorable passwords.

...

https://phishingquiz.withgoogle.com/

October Week One ( Passwords )

Please watch a funny video about Passwords (Jimmy Kimmel Live Jan 2015). What do you think, still true today? (spoiler alert the answer is yes)

View file
nameJimmy Kimmel Live - What's Your Password (2015).mp4
height250

...

For more information about ways to keep you and your family safe online visit https://staysafeonline.org/stay-safe-online/online-safety-basics/ 

Image Removed


Observed every October, the 16th 17th annual National Cyber Security Awareness Month (NCSAM) is committed to encouraging personal accountability, securing behaviors, and maintaining digital privacy in the cybersecurity landscape. This initiative was created as a joint effort between government and industry providing resources to stay safe and secure online.

...