Cybersecurity

social engineering usb drive
 
First of all, what the heck is social engineering? Kind of a strange term if you ask me, but it's pretty simple. It's people hacking. The largest vulnerability in any organization is the (most of the time) good, (usually) honest, hardworking (when the boss is around) employees at that organization. I point out these stereotypes because humans are unpredictable, inconsistent, emotional beings that can be easily manipulated. The same cannot be said about computers and often times technology, firewalls, etc. simply stump even the best hackers. But what if they can trick someone into letting them in? That's the art of social engineering.
 
Have you ever found a thumb drive, memory card, or burned CD on the ground and thought "score!" or "I wonder what's on this?" Chances are, you have, but a little known fact is that hackers use this technique to deliver all sorts of malware that can lead to data breaches, ransomware, spyware, and other attacks. Be cautious of what you plug into your machines! This isn't just limited to thumb drives, either. Hackers are using almost any kind of peripheral. Even smartphone charging cables! Bring any such device to your tech before use. Stay safe!
 
 
0
0
0
s2sdefault
beware free wifi
 
There are a number of ways attackers can steal personal information from you and your devices while using free WiFi. This includes (but is not limited to) hotels, restaurants & libraries. You can spot an insecure network by the absence of a lock icon next to the network name.

Always use secure networks that you have been authorized to use and given the password to. When using a mobile device, use your cellular data when possible rather than insecure WiFi networks. When using a non-cellular device, tethering is a favorable option (sharing the network connection from your phone to your computer).

In the event that you have to use an insecure connection, using a VPN (a virtual private network) is recommended. They're simple to set up and often times free. Good luck and stay safe!
0
0
0
s2sdefault
Cybersecurity Resources Page Security Awareness Training
 
If you're here, you've probably recently received one of my security trainings. In this training, we discussed a number of different tools, resources, etc. to help aid you in your pursuit to increase the security of your digital life.

Below is a link to a Google doc containing MORE links (yay links!) to all those resources, videos, tools, and articles discussed. If there's anything you think I've missed, please reach out to me This email address is being protected from spambots. You need JavaScript enabled to view it. and I'll be sure and add them.
 
0
0
0
s2sdefault
phishing article
 
Ever gotten an email that was a little out of the ordinary? Maybe it had bad grammar? Or maybe it asked that you click a link or download a file that you weren't expecting? All of the above? You're not alone. Next time you get an email like this, there are a couple of quick verifications you should do, because cyber criminals are getting better and better at evading filters and making sure their phishing scam lands in your inbox.

The next time you get an email like this, hover your mouse over any links or buttons you see for a few seconds, but don't click! You'll see a pop-up window displaying the URL of the site where that button or link REALLY takes you. Next, verify the sender. Take a close look at the email address it was sent from. Is was it sent from a domain (@gmail.com for example) that you'd expect? If not, forward it to your IT department so they can blacklist it and keep anyone in your district from potentially falling victim. Gold star for you!
 
I have used this handy little cheat sheet many times when checking through a suspicious email. Check for these red flags. ANY of these are plenty of reason to be skeptical. Better safe than sorry.
 
social-engineering-red-flags
 
 
0
0
0
s2sdefault