Train employees to avoid inadvertent cyber security breaches

Similar documents
FAQ. Usually appear to be sent from official address

Safety and Security. April 2015

Target Breach Overview

How to recognize phishing s

41% Opens. 73% Clicks. 35% Submits Sent

A practical guide to IT security

PRACTICING SAFE COMPUTING AT HOME

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Employee Security Awareness Training

Cyber Security Guide for NHSmail

Cyber Security Guide. For Politicians and Political Parties

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Your security on click Jobs

Online Scams. Ready to get started? Click on the green button to continue.

The Cyber War on Small Business

3.5 SECURITY. How can you reduce the risk of getting a virus?

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Cyber Hygiene Guide. Politicians and Political Parties

The Dilemma: Junk, Spam, or Phishing? How to Classify Unwanted s and Respond Accordingly

Newcomer Finances Toolkit. Fraud. Worksheets

2 User Guide. Contents

Personal Cybersecurity

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Spam Protection Guide

Phishing: Don t Phall Phor It Part 1

How to Build a Culture of Security

South Central Power Stop Scams

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

Evolution of Spear Phishing. White Paper

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

BEST PRACTICES FOR PERSONAL Security

Webomania Solutions Pvt. Ltd. 2017

TIPS TO AVOID PHISHING SCAMS

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Best Practices Guide to Electronic Banking

PHISHING ATTACKS: 9 BAD HABITS MALICIOUS S LOVE. Proactive IT Solutions.

OA Cyber Security Plan FY 2018 (Abridged)

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Online Threats. This include human using them!

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

IT & DATA SECURITY BREACH PREVENTION

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Stealing digital information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Security. The DynaSis Education Series for C-Level Executives

falanx Cyber Falanx Phishing: Measure your resilience

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

BRING SPEAR PHISHING PROTECTION TO THE MASSES

FAQ: Privacy, Security, and Data Protection at Libraries

Fighting Phishing I: Get phish or die tryin.

Phishing. What do phishing s do?

Why was an extra step of choosing a Security Image added to the sign-in process?

Create strong passwords

Modern two-factor authentication: Easy. Affordable. Secure.

Introduction to Information Security Dr. Rick Jerz

Security Practices & File Encryption

Port Facility Cyber Security

INTERNET SAFETY IS IMPORTANT

Security Gaps from the Field

ANNUAL SECURITY AWARENESS TRAINING 2012

ATTACHMENTS, INSERTS, AND LINKS...

Online Security and Safety Protect Your Computer - and Yourself!

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

Protecting Your Business From Hackers

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

ONLINE SAFETY. Messaging, , Vlogging and Sexting

with Advanced Protection

Security & Phishing

Cyber security tips and self-assessment for business

Client Resources. participant guide

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Chapter 6 Network and Internet Security and Privacy

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

PROTECTING YOUR BUSINESS ASSETS

But it Was Such a Little Phish February 2016 Webinar

PBX Fraud Information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

mhealth SECURITY: STATS AND SOLUTIONS

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Cyber Security Updates and Trends Affecting the Real Estate Industry

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Phishing: When is the Enemy

To learn more about Stickley on Security visit You can contact Jim Stickley at

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

How To Remove Personal Antivirus Security Pro Virus Manually

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

MESSAGING SECURITY GATEWAY. Solution overview

Why you MUST protect your customer data

Who We Are! Natalie Timpone

Security Using Digital Signatures & Encryption

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

How To Remove Personal Antivirus Security Pro Virus

Phishing. Eugene Davis UAH Information Security Club April 11, 2013

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Transcription:

Train employees to avoid inadvertent cyber security breaches

TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack the resources to enact a strong defense against cyber crimes and take for granted that their information technology systems are relatively safe. To better understand some of the common ways employees can unwittingly become a conduit for hackers, take the following quiz. This quiz was adapted from a resource offered as a public service by the Armed Forces Communications and Electronics Association, a not-for-profit association of data security professionals. TRUE OR FALSE 1. Mobile applications downloaded from major brand online stores are generally safe. False: These stores may try to vet mobile applications for malicious behavior, but there s no guarantee they re safe. Some online stores may not assess the legitimacy of an app at all, or not adequately. To see where a link actually leads, let your mouse hover over the link without clicking on it. 2. The address or URL you see in the link is always the actual website to which you re being directed. False: Masking the real website address in links is a common way cyber criminals use to fool unsuspecting victims into visiting malicious websites. To see where a link actually leads, let your mouse hover over the link without clicking on it. 3. What you or your employees do on social media could have a negative impact on you or your organization. True: Identity thieves and other criminals are adept at piecing together data bits from various social media sites, and using the information to plan online and physical attacks.

TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 3 4. Your vendors maintain strict cyber security procedures. Possibly false. In other words, don t count on it. When choosing vendors, ask how they protect their networks and train employees, and what kind of background checks they perform. Some of the large companies that have been recently hacked were infiltrated after thieves first broke into the databases of their vendors. 5. Most links to phishing websites are now sent through social media instead of spam emails. True: Social media is now the preferred phishing hole. Let s say your employee, while on a company computer, visits a social media site and clicks a link that appears real, but which actually connects to a phishing website. That action may open a door that allows malicious software to be downloaded onto your computer, or which may be used to steal the employee s username and password. This, in turn, can enable criminals to break into your system. Phishers can easily cut and paste graphics from legitimate websites to make the email appear genuine. POWERFUL MOTIVATION All it takes is for one employee to click on the wrong link and your business could be in jeopardy. After a thief hacks into your system, the rewards can be great, so there s a powerful motivation to keep trying. To guard against security issues and minimize risk, here are some tips to share with your staff. Realize that a familiar logo may be a copy used to create a facade of credibility. Phishers can easily cut and paste graphics from legitimate websites to make the email appear genuine. Watch carefully for erroneous messages for example, an email containing a fake purchase confirmation. The message directs the user to click a link for more information. Such links and attachments may allow thieves to gain access to your passwords or install malware on your computer.

TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 4 Know that personal details about you in an email don t necessarily indicate the sender is legitimate. Determined cyber crooks are patient. They gather information about you and use it to create the illusion of familiarity and win your trust. Determine whether the sender s address and name matches that of the alleged sender. A common tactic is to take an email address and slightly misspell the name or add extra letters. An unwary eye might not notice this variation. Phishers often use threats or warnings to make you respond quickly without taking a moment to consider the legitimacy of the email. A common scam is to tell the recipient an account will be locked for nonpayment unless immediate action is taken. Use full device encryption for sensitive data, set up strong passwords and make sure all of your applications are up to date. Notice the mechanics of the message. Internet crooks aren t known for their ability to spell or use grammar properly. They generally don t employ proofreaders. Here s an example of a call to action from an actual spam message: please clicking on reply. CYBER TIPS FOR ROAD TRIPS Employees who travel for work need to be on high alert for hacking attempts. This is especially true if they travel to a foreign country that might have a high priority on looking for commercially sensitive data. Don t expect any protection from hackers including the government of the country you are visiting. In some countries, you can assume there s a good chance your digital communications will be monitored. If you think there may be a high degree of risk, take only essential digital devices. Otherwise, back up all sensitive data, then delete it off of the devices you ll be traveling with. Use full device encryption for sensitive data, set up strong passwords and make sure all of your applications are up to date. Also, you can register for the U.S. Department of State s Smart Traveler Enrollment Program to receive travel alerts regarding your destinations.

TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 5 SAFE BUT NOT SECURE Never assume your digital equipment is secure just because it s locked in a hotel room safe. Safes can be opened by certain hotel employees if they re determined to steal data from you. Public computers in business centers, internet cafés and kiosks are anything but secure, and shouldn t be used for any sensitive business or personal communications. When you get home, be sure that your antivirus software is current and run a full system scan. It might also be wise to change all of your passwords and throw away any removable media you bought or used on the trip. ASSUME THE WORST Never assume your digital equipment is secure just because it s locked in a hotel room safe. When it comes to the security of your company s databases, you can t be too careful. In the interest of safety, you need to assume mistakes will be made. That s why it s critical to go over computer security issues with your staff regularly, alerting them to new scams and providing tips for avoiding them.