Technology Staff Members
Technology Department
Passwords - Security Tip of the Week
PASSWORDS Passwords are one of the ways we prove who we are on the network/system. Having a strong, unique password for each of your devices, online accounts and applications is a key strategy for protecting your online identity.
- A strong password means it cannot be easily guessed by hackers or by their “brute force” automated programs. Instead of a single word, use a long passphrase of multiple words with some symbols and numbers thrown in for good measure.
- A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe. Food for thought: Do you really want your Google, Facebook, or Pinterest account password to be the same as your Bank or Investment account password?
Examples of a passphrase: I love shopping 1L0v3$h0pp1ng Let’s go fishing L3tsg0Ph1$hing
Remember, it is everyone’s responsibility to ensure the network and the information on the network is secure.
Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.
Phishing - Security Tip of the Week
PHISHING Email has become one of the primary ways we communicate in our personal and professional lives. Because e-mail is so widely used, it is one of the favorite ways cyber criminals use to attack individuals and businesses. Phishing refers to an attack that uses email that tricks into taking an action, such as clicking on a link or opening an attachment. By falling victim to such an attack, you risk having your personal information stolen and/or your computer infected.
Attackers work hard to make their phishing emails convincing. For example, they will make their email look like it came from someone or something you know, such as a friend or a trusted company. They will even add logos of your bank or forge the email address so the message appears more legitimate. Be aware and use common sense, if an email seems odd or too good to be true, it is most likely an attack.
With Tax season approaching, be aware of IRS and Bank scams associated with tax refunds.
Security is everyone’s responsibility.
Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.
Backups - Security Tip of the Week
BACKUPS Backups are an important part of your computer or mobile devices maintenance. It is just as important, if not more, than patches and software upgrades. When it comes to backing up data (pictures documents, spreadsheets, banking software, etc), there can be a lot of varying opinions on how often you should backup your computer or mobile device. The most important thing is to have a backup before a potential data loss disaster happens. Without a backup, there is little to no chance of recovering the data. These days, most operating systems and mobile devices support automatic backups. Chances are good yours does, so set it up. Sometimes, no matter how careful you are, your computer or mobile device could become compromised by a malicious virus, you have a corrupt hard-drive that crashes, or it slips out of your hand and shatters on the floor. Whatever way it happens, you may need to do a restore or recovery to get that device and your information back in working order.
Can you answer these questions? o Have you backed up your computer or mobile device?
If yes, good for you.
o Do you remember when?
o Do you know where it is located? Is it on a thumb drive, external hard-drive, network drive, the cloud?
o Do you know how to restore the backup to your computer if necessary? In the Age of Information, data is important, so make sure you do not lose yours.
Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.
Social Media
Social Media In one form or another, people are using social media websites to meet, interact and share with people from around the world. Sites like Facebook, Twitter, Instagram, and LinkedIn are very popular and are amazing resources for connecting with other people. With great power comes great responsibility, and if not used correctly, these sites and the information you share on them could create some risks for you, your family, friends, and employer.
Here are some of the risks to consider and how to protect yourself when using social media websites:
*Privacy · Future impacts There are some organizations that will search social media websites when conducting background checks on potential employees and new student applications. Embarrassing or incriminating photos could prevent you from getting hired or promoted.
· Attacks Against You Cyber Attackers can analyze your posts and use them to gain access to your information. They can use the information you share to guess the answers to the secret questions that reset your online passwords, create targeted e-mail attacks against you (spearfishing), or call someone in your organization pretending to be you. They can even use this information to identify where you work or live.
The best protection when using social media is to be aware of the information you post. Social media is exactly that, social, but to someone seeking information about you, it can be a treasure-trove. Privacy settings do provide a level of protection, but they vary from site to site and change frequently.
*Security · Login Protect each of your accounts with a strong unique password and do not share them with anyone else.
· Privacy settings Make sure you use the privacy settings offered by the Social Media website and make sure you review and test those settings regularly.
· Encryption Most social media websites use encryption called HTTPS to secure your online connections. Check to make sure your account settings are enable to use HTTPS by default.
· E-mail Be suspicious of e-mails that claim to come from social media sites. These can easily be spoofed attacks sent by cyber criminals.
· Mobile Apps If your social media website has a mobile app, make sure you download these apps from a trusted site and that your smartphone is protected with a strong password.
Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.