Recent News

Cyber Aware Month Tips - Review

https://gallery.mailchimp.com/1cfc376f9f35e50eaea6eb1e0/images/d2cbcf3e-9d51-4be0-a005-88d4e601d493.png

Your MOIT Cybersecurity Team would like to remind you to remember the tips and stay safe online both at home and work.

Don't Get Hooked by Phishing Emails

 The phisherman

One of the most popular methods used by cyber criminals is called “phishing”.  What is Phishing - Phishing is a scam typically carried out by an unsolicited email, telephone call, text message and/or website that poses as a legitimate site and lures unsuspecting victims to provide personal, business and financial information.

RANSOMWARE

ransomware

Ransomware is a malicious software that allows hackers to restrict or Deny access to an individual’s or company’s vital information or PC’S and demand some form of payment (usually Bitcoins) to lift the restriction.

Public or Free Wi-Fi Sites

BE CAREFUL WHEN USING PUBLIC Wi-Fi CONNECTIONS

The Federal Trade Commission advises that places like local coffee shops, airports, or public gathering places that are connected to "free wireless" networks are convenient, but often they’re not secure. Hackers at Starbucks who call their fake WAP "Starbucks Wireless Network" or at the Atlanta airport call it "Atlanta Airport Free Wireless" have all sorts of people connecting to their computer in minutes.

Selecting Secure Passwords

Protecting your Personal Information with Secure Passwords

The Department of Homeland Security advises that email, banking, social media and mobile apps generate a long list of passwords users. While keeping track of numerous account logins can be tedious, there could be serious implications if a cybercriminal gains access to your email, financial information, social security number, or even your medical records. Passwords are the most common means of authentication online, and that is why it is critical to use strong passwords and keep them confidential.

INTERNET OF THINGS 101

INTERNET OF THINGS 101

NCSAM week 4 infographic thumb

 

WHAT IS IT REALLY?

Any devices that sends and/or receives data automatically via the web.This rapidily expanding set of “things” include tags, sensors and devices that interact with people and share information M2M (machine to machine).

BACK IT UP

BACK IT UP

https://staysafeonline.org/download/datasets/2037/Back-It-Up.jpg

A recent study by National Cyber Security Alliance/Symantec found that more than 68% of Americans store 25% or more of their photos digitally. The loss of music, financial records and personal contacts could be devastating for most people. Data can be lost in several ways: computer malfunctions, theft, viruses, spyware, accidental deletion, and natural disasters.

The Holidays Are Coming - Safe Online Shopping Tips

https://staysafeonline.org/download/datasets/2030/Online-Shopping.jpg

Safe Shopping Online:

Protect yourself when shopping online, check to be sure the site is security enabled: Look for web addresses with https:// or the “lock” symbol indicating the site is secure and extra security measures are in place to help protect your personal information. 

Cyber Awareness Special Application

https://gallery.mailchimp.com/1cfc376f9f35e50eaea6eb1e0/images/d2cbcf3e-9d51-4be0-a005-88d4e601d493.png

 As part of Cyber Awareness Month download this free app from ITunes. 

The Center for Internet Security is featuring a fun, dynamic, and challenging game format called Hax Attacks that teaches players about cybersecurity concepts like password strength, phishing attacks, firewalls, and more.   Hax Attacks is free to download on the iOS platform from itunes.apple.com throughout the month of October as part of Cyber Awareness Month.   Hax Attacks is playable on most iPhones and iPads.  Good luck and have fun!

Stay Social Media Savvy

 

Stay Social Media Savvy

Privacy and Security Settings:

Keep all your social networking profiles like Facebook, Twitter, Snapchat, Instagram etc. set to private. Your personal information such as your (full name, date of birth, phone number, posts and pictures, etc.) is public, if you do not choose the private and security settings. Read your social network site rules and policies.

Pages