吃瓜大本营

Cybersecurity Awareness Month

Week 1

Learn about听.

Learn about听.

Download the听Multifactor-Authentication Poster.

MULTI-FACTOR AUTHENTICATION: WHY YOU SHOULD RACE TO EMBRACE IT

Authentication, in a security context, is about verifying your identity. And you authenticate on a regular basis: When you log into accounts and systems, the information you provide is intended to confirm your status as an authorized user. The problem with single-point authentication (think passwords and PINs) is that it鈥檚 also a single point of failure. If a password is the only safeguard in place, and that password is compromised鈥 well, everything is compromised.听

Multi-factor authentication (MFA)鈥攁lso commonly referred to as two-factor authentication (2FA)鈥攈as gained steam over the past several years. Technology advancements have made it relatively simple to implement MFA for key accounts, data repositories, and cloud-based systems. But there is another driving force behind MFA adoption: Password theft and successful credential compromise attacks have skyrocketed.听

MFA enhances security by requiring two or more pieces of information鈥攖hat is, multiple factors鈥攄uring the authentication process. There are three key factors in MFA:听

  1. Something you know, like a password, PIN, or passphrase听

  1. Something you have, like a real-time, unique verification code. These authentication codes are usually generated by a mobile app or security token, or they are delivered to you via a text message.听

  1. Something you are, at a biometric level, like a fingerprint, iris scan, or voice pattern.听


In some cases, MFA isn鈥檛 optional. Organizations often require employees to provide multiple forms of authentication for assets like virtual private networks (VPNs) and cloud-based systems.听

But in other cases, the choice is yours. Many websites and applications have implemented MFA鈥攂ut it鈥檚 up to you to enable it. Here are three reasons you听should always take advantage of MFA when it鈥檚 offered:听

  1. It鈥檚 easy to add -听 Yes, you must take an action to enable MFA for your logins. But the process isn鈥檛 difficult. Sites and applications generally provide simple, step-by-step instructions and clearly explain when to expect an MFA prompt, and how to complete a login.听

  1. It鈥檚 easy to use - As noted, there are multiple ways an organization might implement MFA. But regardless of the technology behind the additional authentication factor(s), MFA adds just a few seconds to your login process. (And the extra seconds are worth it.)听

  1. It鈥檚 far more secure than a password alone - Cybercriminals have access to billions of stolen usernames and passwords on underground forums. So 鈥 what if the only thing standing between a criminal and your data, finances, and files is a compromised password? MFA helps to limit the damage that can be done if a threat actor steals (or buys) account credentials.

Week 2

Learn about听.听

Learn about听.

Download the听Password Poster.

UNDER LOCK AND KEY听听

Creating strong passwords offers greater security for minimal effort.

You can buy a small padlock for less than a dollar鈥攂ut you shouldn鈥檛 count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to 鈥渓ock up鈥 their most valuable assets, including money and confidential information.听

Fortunately, everyone can learn how to make and manage stronger passwords. It鈥檚 an easy way to strengthen security both at work and at home.听

What makes a password 鈥渟trong鈥?听

Let鈥檚 say you need to create a new password that鈥檚 at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like 鈥渟trawberry鈥) and common patterns, such as capitalizing the first letter.听

Increasing a password鈥檚 complexity, randomness, and length can make it more resistant to hackers鈥 tools. For听example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries.听

You can learn more about creating strong passwords in your organization鈥檚 security awareness training. Your organization may also have guidelines or a password policy in place.听

Why Uniqueness Matters听

Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password (even a strong one) they can often use it to access other valuable accounts.听

Here鈥檚 a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.听

Alice didn鈥檛 realize the gardening forum had been hacked, and that users鈥 login credentials had been leaked online. An attacker probably tried reusing Alice鈥檚 leaked password on popular sites鈥攁nd eventually got lucky.听

Guarding Your Passwords

  1. Don鈥檛 write them down.听Many make the mistake of writing passwords on post-it notes and leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, don鈥檛 store your login information in a file on your computer, even if you encrypt that file.听听

  1. Don鈥檛 share passwords.听You can鈥檛 be sure someone else will keep your credentials safe. At work, you could be held responsible for anything that happens when someone is logged in as you.听

  1. Don鈥檛 save login details in your browser.听Some browsers store this information in unsafe ways, and another person could access your accounts if they get your device.听听


Week 3

Learn about听.

Download the听Outdated Software Poster.

Week 4

Learn about听.

THREE KEYS TO AVOIDING PHISHING EMAILS听AND RANSOMWARE ATTACKS听

Whether a large-scale onslaught or a smaller, more targeted campaign, all successful phishing and email-based ransomware attacks are disruptive and damaging on some level. And the simple reality is that they rely on human error; in order for cyberattacks to succeed, someone, somewhere, needs to take the bait. Cybercriminals utilize social engineering techniques鈥攕ome basic and some very sophisticated鈥攖o manipulate human emotions and trigger a response.听

It can feel overwhelming sometimes given that we, as the targets, need to be right all the time while the attackers only need to be right once. But the good news is that small steps can amount to big strides when it comes to protecting data, devices, and systems at work and at home. Here are three simple, practical cybersecurity awareness training tips you can use to identify and avoid malicious emails听

#1 Stop Skimming and Start Studying

听We receive so many emails that we鈥檝e conditioned ourselves to skim messages and make quick听 decisions. But when we do this, we take unnecessary risks. That鈥檚 because there can be clues both on the surface and just below the surface of the message that can alert us to things that aren鈥檛 right.听

鈥淔rom鈥 addresses, URLs, and embedded links can masquerade as things they aren鈥檛.听听

鈥疍o not take these items at face value (even if a name, logo, or other identifiers seem familiar and safe). On your PC, hover over鈥攐r 鈥渕ouse over鈥濃攖hese pieces of content and examine the info that appears (you will often see the true destination of a web address in the bottom left of your browser window). On mobile devices, use a 鈥渓ong press鈥 or 鈥渓ong click鈥 and review the information in the pop-up window. If there appears to be a mismatch between what you expected to see and what is actually presented, steer clear.听听

The content or topic of a message might not be quite right or not fully relevant to you.听

Be on alert if the tone of an email from a colleague, friend, or relative seems inappropriate or just doesn鈥檛 鈥渟ound like鈥 them. Likewise, be sure to question receipt of an invoice or shipping notification that doesn鈥檛 make sense based on your ordering history. Thoroughly read what is written; don鈥檛 just skim past details.听听

Misspellings and poor grammar can be indicators that the email did not originate from a trusted source.听听

This is particularly true with messages that appear to be from a well-known, well-established individual or organization.听听

In general, any unsolicited email鈥攖hat is, any email that you were not explicitly expecting to receive鈥攕hould be looked at carefully. But you should be particularly wary of any email that seems like it鈥檚 designed to trigger an emotional response鈥 fear, surprise, excitement, concern鈥攁nd that urges you to respond or act in some way (click a link, download a file, confirm/change a password, etc.).听

#2 Think It Through听

After you read an email, take a moment to digest it. What you want to do is give yourself the space to act thoughtfully, rather than just reacting in the moment. To help get yourself out of the habit of skimming and reacting, consider asking yourself a few quick questions about any email that requests a response or action that could compromise sensitive data, devices, or systems.听听

For example:听听

Was I expecting this message?鈥 If the answer is 鈥渘o,鈥 ask more questions.听听

Does this email make sense? 鈥 If the tone doesn鈥檛 seem right or the information you鈥檙e being provided doesn鈥檛 make sense, it could very well be a phish.听听

Am I being pushed to act hastily or out of fear? 鈥 If you are, this is a major red flag.听听

Does this seem too good to be true?鈥揑f you can鈥檛 believe what you鈥檙e reading, it鈥檚 likely you鈥檙e reading a phish.听听

What if this is a phishing email? 鈥 This is a great question to ask yourself, because it can help you work through the things that could happen if you鈥檙e dealing with a phishing attack. Could you be downloading malware that would corrupt all your files? Could you be turning over a password or credit card number to a criminal? Could you be exposing your coworkers鈥 private information to a scammer?听

#3 Verify, Verify, Verify听

So nice, it鈥檚 worth saying thrice.听听

It鈥檚 critical to remember that, with phishing scams, things are never what they seem. The reality is that a message can look and even sound legitimate but still set off a warning bell. For example, an email that comes from a corporate IT address and tells you to download new security software can seem trustworthy; it appears real and is on topic. But would that really be the process your IT department would follow?听听

If reading and thinking don鈥檛 get you to 100% confidence, you must take extra steps to verify that you are dealing with a legitimate request before you click a link, download a file, or reply with sensitive data. Here are some easy ways to confirm that the information presented in an email is legitimate:听听

Instead of clicking on a link, open your web browser and type in a known, trusted URL and navigate to the site yourself.听听

Instead of replying to an email or calling a number included in the message, do your own fact-finding. Use an email address or phone number that you are able to confirm.听听

If you鈥檝e received a questionable message from a colleague or friend, contact them via another channel (like a phone call or text message) to make sure they sent it.听听

Reach out to your IT team for advice. Alert them that there is a potential phishing threat active on your organization鈥檚 network.听听

It takes just a minute to confirm a questionable message, whether it comes from a coworker, internal department, financial institution, or other source. In contrast, it can take days or weeks (or even longer) to remedy the consequences of interacting with a phishing or ransomware email. And sometimes you can鈥檛 ever remedy the consequences.


Did you know?

The Information Security team offers many services that can help your unit stay safe from cyber threats. For more information on what we can do to help from assessments to specialized training, please visit this page.

social-engineering

Videos

Learn more