You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »


We hope you had some fun while learning something new about cybersecurity and ways to stay secure. We will close out the month with the leading security issue, Human Error, which has increased with our increased use of technology in our everyday life.



Human Error vs. Sound Judgment 



Human Error is has been identified as the leading reason for most security incidents. Watch this Mimecast sketch and see where Human Error should be replaced with Sound Judgment. After watching see if you can reduce Human Error with your day-to-day online activities.


Mimecast-Human-Error-vs-Sound-Judgment.mp4


SIMPLE TIPS to detecting a Phish and things you can do.

Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email.

  • Be cautious of generic greetings such as “Hello Bank Customer,” as these are often signs of phishing attempts. If you are concerned about the legitimacy of an email, call the company directly.
  • Think before you act. Be wary of communications that implore you to act immediately. Many phishing emails attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via customer service to verify the communication.
  • Protect your personal information. If people contacting you have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.

Want to see if you can spot a phish?

Visit the google phishing quiz site.
https://phishingquiz.withgoogle.com/




Phishing and Passwords 



Phishing is still a common and growing event.  Watch this Defense Works sketch where some common phishing scam emails are played out in real life. Maybe after viewing you can better spot phishing scams.


DefenseWorks-Phish-EmailSketch.mp4

Phishing attacks use email or malicious websites to get you to respond to steal your personal information or money and can infect your machine with malware and viruses. 

Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers.


HOW CRIMINALS LURE YOU IN
The following messages are examples of what attackers may email, use social media, or even text you when phishing;

  • "Are you available? Can you buy me some Gift Cards? I will pay you back"
  • "Need a Virtual Assistant. I will send you a Check now... or for the exchange of Gift Cards"
  • “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below, and confirm your identity.”
  • “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
  • “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”


Passwords. Old but good one. Let's make strong memorable passwords.

Jimmy Kimmel Live - What's Your Password (2015).mp4



Creating a strong password is an essential step to protecting yourself online and at Suffolk. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime. Creating a strong password is easier than you think. Follow these simple tips to shake up your password protocol:


SIMPLE TIPS to a better Password

Don’t make passwords easy to guess. Do not include personal information in your password such as your name or pets’ names. This information is often easy to find on social media, making it easier for cybercriminals to hack your accounts.

Use a long passphrase.  Consider using the longest password or passphrase permissible. For example, you can use a passphrase such as a news headline or even the title of the last book you read. Then add in some punctuation and capitalization.

Avoid using common words in your password. Substitute letters with numbers and punctuation marks or symbols. For example, @ can replace the letter “A” and an exclamation point (!) can replace the letters “I” or “L.”

Get creative. Use phonetic replacements, such as “PH” instead of “F”. Or make deliberate, but obvious misspellings, such as “enjin” instead of “engine.”

Keep your passwords on the down-low. Don’t tell anyone your passwords and watch for attackers trying to trick you into revealing your passwords through email or calls. Every time you share or reuse a password, it chips away at your security by opening up more avenues in which it could be misused or stolen.

Unique account, unique password. Having different passwords for various accounts helps prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. It’s important to mix things up—find easy-to-remember ways to customize your standard password for different sites.

Utilize a password manager to remember all your long passwords. The most secure way to store all of your unique passwords is by using a password manager. With just one master password, a computer can generate and retrieve passwords for every account that you have – protecting your online information, including credit card numbers and their three-digit Card Verification Value (CVV) codes, answers to security questions, and more. 


For more information on Passwords please visit https://wikis.suffolk.edu/display/ITSEC/Strong+Password


For more information about ways to keep you and your family safe online visit https://staysafeonline.org/stay-safe-online/online-safety-basics/ 



Observed every October, the annual National Cyber Security Awareness Month (NCSAM) is committed to encouraging personal accountability, securing behaviors, and maintaining digital privacy in the cybersecurity landscape. This initiative was created as a joint effort between government and industry providing resources to stay safe and secure online.





  • No labels