Category: Featured

Oct 23rd

10 Common Cybersecurity Misconceptions


COMMON CYBERSECURITY MISCONCEPTIONS FOR SMALL AND MEDIUM-SIZED ORGANIZATIONS

Misconception #1: My data (or the data I have access to) isn’t valuable.

All data is valuable

Take Action: Do an assessment of the data you create, collect, store, access, transmit and then classify all the data by level of sensitivity so you can take steps to protect it appropriately.

Misconception #2: Cybersecurity is a technology issue.

Cybersecurity is best approached with a mix of employee training; clear, accepted policies and procedures and implementation of current technologies.

Take Action: Educate every employee on their responsibility for protecting sensitive information.

Misconception #3: Cybersecurity requires a huge financial investment.

Many efforts to protect your data require little or no financial investment.

Take Action: Create and institute cybersecurity policies and procedures, restrict administrative and access privileges, enable multi-factor authentication and train employees to spot malicious emails.

Misconception #4: Outsourcing to a vendor washes your hands of liability during a cyber incident.

You have a legal and ethical responsibility to protect sensitive data.

Take Action: Put data sharing agreements in place with vendors and have a trusted lawyer review.

Misconception #5: Cyber breaches are covered by general liability insurance.

Many standard insurance policies do not cover cyber incidents or data breaches.

Take Action: Speak with your insurance representative to understand your coverage
and what type of policy would best fit your organization’s needs.

Misconception #6: Cyberattacks always come from external actors.

Succinctly put, cyberattacks do not always come from external actors.

Take Action: Identify potential cybersecurity incidents that can come from within the
organization and develop strategies to minimize those threats.

Misconception #7: Younger people are better at cybersecurity than others.

Age is not directly correlated to better cybersecurity practices.

Take Action: Before giving someone responsibility to manage your social media, website and network, etc., train them on your expectations of use and cybersecurity best practices.

Misconception #8: Compliance with industry standards is sufficient for a security strategy.

Simply complying with industry standards does not equate to a robust cybersecurity strategy for an organization.

Take Action: Use a robust framework, such as the NIST Cybersecurity Framework, to
manage cybersecurity risk.

Misconception #9: Digital and physical security are separate things altogether.

Do not discount the importance of physical security.

Take Action: Develop strategies and policies to prevent unauthorized physical access to sensitive information and assets (e.g., control who can access certain areas of the office.)

Misconception #10: New software and devices are secure when I buy them.

Just because something is new, does not mean it is secure.

Take Action: Ensure devices are operating with the most current software, change the manufacturer’s default password to a unique, secure passphrase and configure privacy settings prior to use.

Next Steps For You

Now that you’re more aware of common cybersecurity misconceptions, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

 

 

Source: staysafeonline.org/cybersecure-business

Oct 18th

5 Steps to Protecting Your Digital Home


More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which in turn can save us time and money while providing convenience and even safety. These advances in technology are innovative and intriguing, however, they also pose a new set of security risks. #BeCyberSmart to connect with confidence and protect your digital home.

SIMPLE TIPS TO PROTECT IT

  • Secure your Wi-Fi network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication (MFA) How-to-Guide for more information.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems.
    If you have the option to enable automatic updates to defend against the latest risks, turn it on. And, if you’re putting something into your device, such as a USB for an external hard drive, make sure your device’s security software scans for
    viruses and malware. Finally, protect your devices with antivirus software and be sure to periodically back up any data that cannot be recreated such as photos or personal documents. Learn more about the Internet of Things (IoT) or smart devices which refer to any object or device that is connected to the Internet.
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are— and where you aren’t —at any given time. Read the Social Media Cybersecurity Tip Sheet for more information.

Next Steps For You

Now that you’re more aware of protecting your digital home, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 17th

If You Connect, You Must Protect


Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.

WHY SHOULD WE CARE?

  • Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot;
    mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.
  • New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
  • The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
  • With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.

SIMPLE TIPS TO OWN IT

  • Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information.
  • Keep tabs on your apps. Many connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Secure your network. Properly secure the wireless network you use to connect Internet-enabled devices. Consider placing these devices on a separate and dedicated network.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on.

Next Steps For You

Now that you’re more aware of protecting what you are connecting, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 15th

5 Ways to Be Cyber Secure at Work


Businesses face significant financial loss when a cyber attack occurs. According to the Identity Theft Resource Center, in 2018, the U.S. business sector had the largest number of data breaches ever recorded: 571 breaches. Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the vigilance of everyone to keep data, customers, and capital safe and secure. #BeCyberSmart to connect with confidence and support a culture of cybersecurity at your organization.

SIMPLE STEPS TO SECURE IT

  1. Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.
  2. Technology has its limits. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to prevent data breaches.
  3. Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  4. Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial
    departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share PII on social media platforms. Read the Social Media Cybersecurity Tip Sheet for more information.
  5. It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately. For more information about email and phishing scams see the Phishing Tip Sheet.

Next Steps For You

Now that you learned 5 ways to be cyber safe at work, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

 

Oct 14th

Let’s Talk About Phishing


Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the information or
click on a link, attackers use it to access users’ accounts.

HOW CRIMINALS LURE YOU IN
The following messages from the Federal Trade Commission’s OnGuardOnline are examples of what attackers may email or text when phishing for sensitive information:

  • “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below, and confirm your identity.”
  • “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
  • “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”

SIMPLE TIPS TO SECURE IT

  • Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on
    any links or attachments found in that email. Be cautious of generic greetings such as “Hello Bank Customer,” as these are often signs of phishing attempts. If you are concerned about the legitimacy of an email, call the company directly.
  • Think before you act. Be wary of communications that implore you to act immediately. Many phishing emails attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you receive a
    suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via customer service to verify the communication.
  • Protect your personal information. If people contacting you have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols. Online Privacy
  • Be wary of hyperlinks. Avoid clicking on hyperlinks in emails and hover over links to verify authenticity. Also ensure that URLs begin with “https.” The “s” indicates encryption is enabled to protect users’ information.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
  • Shake up your password protocol. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cyber
    criminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts.
  • Install and update anti-virus software. Make sure all of your computers, Internet of Things devices, phones, and tablets are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.

Next Steps For You

Now that you’re more aware of phishing attacks, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 9th

Cybersecurity While Traveling

In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling— whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use these tips to connect with confidence while on the go.

SIMPLE TIPS TO OWN IT
Before You Go

  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software. 
  • Back up your information. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
  • Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  • Keep it locked. Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords. Read the Creating a Strong Password Tip Sheet for more information.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication (MFA) How-to-Guide for more information.

During Your Trip

  • Stop auto-connecting. Some devices will automatically seek and connect to available wireless networks or Bluetooth devices. This instant connection opens the door for cyber criminals to remotely access your devices. Disable these features so that you actively choose when to connect to a safe network.
  • Stay protected while connected. Before you connect to any public wireless hotspot—such as at an airport, hotel, or café—be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.
  • Play hard to get with strangers. Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate—or if the email looks “phishy,” do not respond and do not click on any links or attachments found in that email. When available use the “junk” or “block” option to no longer receive messages from a particular sender.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are—and where you aren’t— at any given time. Read the Social Media Cybersecurity Tip Sheet for more information.
  • Guard your mobile device. To prevent theft and unauthorized access or loss of sensitive information, never leave your equipment—including any USB or external storage devices—unattended in a public place. Keep your devices secured in taxis, at airports, on airplanes, and in your hotel room. Read Cybersecurity for Mobile Devices tips for more information.

Next Steps For You

Now that you’ve learned Cybersecurity Safety Tips for travel, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 8th

How-to-Guide: Multi-Factor Authentication


SIMPLE TIPS TO SECURE IT
Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, you should consider using multi-factor authentication, also called strong authentication, or two-factor authentication. This technology may already be familiar to you, as many banking and financial institutions require both a password and one of the following to log in: a call, email, or text containing a code. By applying these principles of verification to more of your personal accounts, such as email, social media, and more, you can better secure your information and identity online!

What it is
Multifactor authentication (MFA) is defined as a security process that requires more than one method of authentication from independent sources to verify the user’s identity. In other words, a person wishing to use the system is given access only after providing two or more pieces of information which uniquely identifies that person.

UPDATE YOUR PRIVACY SETTINGS

How it works
There are three categories of credentials: something you either know, have, or are. Here are some examples in each category.

In order to gain access, your credentials must come from at least two different categories. One of the most common methods is to login using your user name and password. Then a unique one-time code will be generated and sent to your phone or email, which you would then enter within the allotted amount of time. This unique code is the second factor.

CYBERSECURITY SAFETY FOR MOBILE DEVICES

SOMETHING YOU KNOW

  • Password/Passphrase
  • PIN Number

SOMETHING YOU HAVE

  • Security Token or App
  • Verification Text, Call, Email
  • Smart Card

SOMETHING YOU ARE

  • Fingerprint
  • Facial Recognition
  • Voice Recognition

CREATE A STRONG PASSWORD

When should it be used?
MFA should be used to add an additional layer of security around sites containing sensitive information, or whenever enhanced security is desirable. MFA makes it more difficult for unauthorized people to log in as the account holder. According to the National Institute of Standards and Technology (NIST) MFA should be used whenever possible, especially when it comes to your most sensitive data—like your primary email, financial accounts, and health records. Some organizations will require you to use MFA; with others it is optional. If you have the option to enable it, you should take the initiative to do so to
protect your data and your identity.

CYBERSECURITY ON SOCIAL MEDIA

Activate MFA on your accounts right away!
Look at your account settings or user-profiles and check whether MFA is an available option. If you see it there, consider implementing it right away! User names and passwords are no longer sufficient to protect accounts with sensitive information. By using multifactor authentication, you can protect these accounts and reduce the risk of online fraud and identify theft. Consider also activating this feature on your social media accounts!

Next Steps For You

Now that you’ve been introduced to MFA, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 7th

Online Privacy


The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal information online to reduce the risk of becoming the victim of a cybercrime.

DID YOU KNOW?

  • 64% of U.S. adults have noticed or been notified of a major data breach affecting their sensitive accounts or personal data.*
  • Roughly half of Americans (49%) feel that their personal information is less secure than it was five years ago.**
  • 58% of Americans age 50 and older are more likely to feel that their personal information has become less safe in recent years: 58% of Americans in this age group express this opinion.***
  • 69% of consumers believe companies are vulnerable to hacks and cyberattacks.****

CYBERSECURITY SAFETY FOR MOBILE DEVICES

SIMPLE TIPS TO OWN IT

  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
  • Shake up your password protocol. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts. Read the Creating a Strong Password post for more information.
  • Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
  • Play hard to get with strangers. Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks “phishy,” do not respond and do not click on any links or attachments found in that email. When available use the “junk” or “block” option to no longer receive messages from a particular sender.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are—and where you aren’t—at any given time. Read the Social Media Cybersecurity post for more information.
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Stay protected while connected. Before you connect to any public wireless hotspot—such as at an airport, hotel, or café—be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the
    network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.

Next Steps For You

Now that you’ve been introduced to Online Privacy and Cybersecurity, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

 

References
*Smith, Aaron. “Americans and Cybersecurity.” Pew Research Center: Internet, Science & Tech. April 27, 2017. https://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/.
**Ibid.
***Ibid.
****PricewaterhouseCoopers. “Consumer Intelligence Series: Protect.me.” PwC. 2017.
https://www.pwc.com/us/en/services/consulting/library/consumer-intelligence-series/cybersecurity-protect-me.html.

Oct 4th

Creating a Strong Password

Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime. No citizen is immune to cyber risk, but #BeCyberSmart and you can minimize your chances of an incident.

SIMPLE TIPS TO SECURE IT

Creating a strong password is easier than you think. Follow these simple tips to shake up your password protocol:

  • Use a long passphrase. According to NIST guidance, you should consider using the longest password or passphrase permissible. For example, you can use a passphrase such as a news headline or even the title of the last book you read.
    Then add in some punctuation and capitalization.
  • Don’t make passwords easy to guess. Do not include personal information in your password such as your name or pets’ names. This information is often easy to find on social media, making it easier for cybercriminals to hack your accounts.
  • Avoid using common words in your password. Substitute letters with numbers and punctuation marks or symbols. For example, @ can replace the letter “A” and an exclamation point (!) can replace the letters “I” or “L.”
  • Get creative. Use phonetic replacements, such as “PH” instead of “F”. Or make deliberate, but obvious misspellings, such as “enjin” instead of “engine.”
  • Keep your passwords on the down-low. Don’t tell anyone your passwords and watch for attackers trying to trick you into revealing your passwords through email or calls. Every time you share or reuse a password, it chips away at your security by opening up more avenues in which it could be misused or stolen.
  • Unique account, unique password. Having different passwords for various accounts helps prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. It’s important to mix things up—find easy-toremember ways to customize your standard password for different sites.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
  • Utilize a password manager to remember all your long passwords. The most secure way to store all of your unique passwords is by using a password manager. With just one master password, a computer can generate and retrieve
    passwords for every account that you have – protecting your online information, including credit card numbers and their three-digit Card Verification Value (CVV) codes, answers to security questions, and more.

Next Steps For You

Now that you’ve been introduced to Cybersecurity Social Media tips, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 3rd

Cybersecurity & Social Media

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely navigate the social media world.

KEY CYBERSECURITY TERMS

DID YOU KNOW?

  • 3.48 billion people worldwide now use social media worldwide. That’s an increase of 9% from 2018. Put another way – 45% of the total world population are using social networks.*
  • Digital consumers spend nearly 2.5 hours on social networks and social messaging every day.**
  • 69% of U.S. adults use at least one social media site*** and the average American has 7.1 social media accounts.

SIMPLE TIPS TO OWN IT:

  • Remember, there is no ‘Delete’ button on the Internet. Share with care, because even if you delete a post or picture from your profile seconds after posting it, chances are someone still saw it.
  • Update your privacy settings. Set the privacy and security settings to your comfort level for information sharing. Disable geotagging, which allows anyone to see where you are—and where you aren’t—at any given time.
  • Connect only with people you trust. While some social networks might seem safer for connecting because of the limited personal information shared through them, keep your connections to people you know and trust.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans.
  • Speak up if you’re uncomfortable. If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let him or her know. Likewise, stay open-minded if a friend approaches you because something you’ve posted makes him or her uncomfortable. People have different tolerances for how much the world knows about them, and it is important to respect those differences. Don’t hesitate to report any instance of cyberbullying you see.
  • Report suspicious or harassing activity. Work with your social media platform to report and possibly block harassing users. Report an incident if you’ve been a victim of cybercrime. Local and national authorities are ready to assist you.

Next Steps For You

Now that you’ve been introduced to Cybersecurity Social Media tips, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

 

REFERENCES:
For more information about connecting with confidence visit: https://niccs.us-cert.gov/nationalcybersecurity-awareness-month-2019 
* Kemp, Simon. “Digital 2019: Global Digital Overview.” DataReportal. January 30, 2019. https://datareportal.com/reports/digital-2019-global-digital-overview. 
** Gwi. “Latest 2019 Social Media User Trends Report.” GlobalWebIndex. 2019. https://www.globalwebindex.com/reports/social. 
***  Newberry, Christina. “130 Social Media Statistics That Matter to Marketers in 2019.” Hootsuite Social Media Management.
March 13, 2019. https://blog.hootsuite.com/social-media-statisticsfor-social-media-managers/.