Entries Tagged 'Security Tips' ↓

Cybersecurity Tip #2 – Secure IT: play hard to get

This week’s cybersecurity focus is to “Secure IT.” by educating yourself about phishing. The simple definition of phishing is social engineering using digital methods for malicious purposes. The definition is fluid due to constantly changing technologies, but some examples include:

  • Malicious Email – It can look like it comes from a financial institution, an e-commerce site, a government agency or any other service or business. It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled, or there is another urgent matter to address.
  • Spear Phishing – Spear phishing involves highly specialized attacks against specific targets or small groups of targets to collect information or gain access to systems. A recent example here on campus was a targeted email to students from a purported ASU alum regarding a (fake) job opportunity for dog care.
  • Imposter Scams – Gift cards are a great way to give a gift. But did you know they are also a scammer’s favorite way to steal money? Gift cards and reloading of cards is the #1 payment method for imposter scams. This scam is so widespread that the Federal Trade Commission set up a webpage to address the issue: https://www.consumer.ftc.gov/blog/2018/10/scammers-demand-gift-cards.
  • Spam & Phishing on Social Networks – Spam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.

An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft. For corporate and government networks, phishing is often used to gain a foothold as part of a larger attack.

Criminals are always looking for ways to hook you with a new phishing scam, so play hard to get. For some simple tips to Secure IT., check out this flyer from our friends at the National Initiative for Cybersecurity Careers and Studies: How to spot and avoid phish.

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Have a great day!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices

Cybersecurity Tip #1 – Own IT: manage your privacy

This week’s cybersecurity focus is to “Own IT.” by managing your privacy.

Your devices — smartphones, laptops, and wearables — make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, locations and health and financial data. Here are a couple of tips to help manage your privacy in an always-on world:

  • Think before you app: Information about you, such as the games you like to play, your contacts list, where you shop and your location, has value, just like money. Be thoughtful about who gets that information and how it’s collected through apps. Remember, personal information is like money. Value it. Protect it.
  • Update your privacy settings: Want to view or change your privacy/security settings for all your different accounts, but don’t know where to find them? Our friends at the National Cyber Security Alliance have put together a list of links for popular apps, devices and online services, including social networks, email accounts, search engines, and more. Check it out here: Manage Your Privacy Settings.

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Have a great day!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices

It’s National Cybersecurity Awareness Month!

October is upon us — the season of pumpkin spice lattes, fall foliage, and Halloween. Did you also know that October is National Cybersecurity Awareness Month? That means it’s time to learn about some easy steps you can take to be safer and more secure online.

Held every October, NCSAM 2019’s theme is: Own IT. Secure IT. Protect IT., emphasizing proactive steps to enhance cybersecurity practices.

Own It.

  • Never click and tell: staying safe on social media
  • Update privacy settings
  • Keep tabs on your apps: best practices for device applications

Secure IT.

  • Shake up your passphrase protocol: create strong, unique passphrases
  • Double your login protection: turn on multi-factor authentication
  • Shop safe online
  • Play hard to get with strangers: how to spot and avoid phish

Protect IT.

  • If you connect, you must protect: updating to the latest security software, web browser and operating systems
  • Stay protected while connected: wi-fi safety
  • If you collect it, protect it: keeping customer/consumer data and information safe

Throughout the month, we’ll provide some videos, other resources, and share some tips to encourage personal accountability and proactive behavior to help protect yourself and the university online.

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Thanks!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices

Beware of Phishing Email Attacks on Campus

Computing Services has received an increased number of reported phishing emails being sent to ASU employees. Many of these messages are being sent in an effort to impersonate the President’s account to trick you into replying to the message or sharing information with the scammer. This is a classic example of a “spear phishing” attack, DO NOT reply to the email or contact the sender in any way.

With spear phishing emails or any other suspicious email messages, don’t reply or click links, and NEVER give out private and sensitive information, or your username and password. Instead, you can contact the ASU Computing Services Helpdesk at x7741, or via email at computingservices@adams.edu to let us know of the scam. You can also contact the sending department to verify its authenticity through other channels such as calling their office directly from the number listed in our campus directory or visit with them in person.

If something looks suspicious, it probably is. Computing Services will never ask you for your username and password, or any other sensitive personal information either by email or over the phone.

As always, if you have any questions or concerns, please don’t hesitate to contact the ASU Computing Services Helpdesk at computingservices@adams.edu, by phone at 719-587-7741 or in person at our Helpdesk on campus.

Computing Services

Cybersecurity Tip #5 – It’s a Hacker’s Paradise

As we close out National Cybersecurity Awareness Month on this snowy Wednesday, we hope that some of the tips we have shared have been useful. The more you know, the more you are prepared for the various threats that are out there. Whether you’re on your phone, tablet, or computer, remember that it’s our shared responsibility to protect ourselves and the university from cyber attacks. As our friends at The Security Awareness Company (thesecurityawarenesscompany.com) say, we live in a hacker’s paradise: https://youtu.be/Ov_9aA4ugP8

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Thanks!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices
www.facebook.com/ASUResNet

Cybersecurity Tip #4 – Phishing: Don’t Get Hooked!

Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment. This type of attack is called phishing. Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or to infect your machine with malware and viruses. Spear phishing involves highly specialized attached against specific targets or small groups of targets to collect info to collect information or gain access to systems.

You may not realize it, but you are a phishing target at school, at work, and at home. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing e-mail messages, texts, or social media posts, look for the following indicators to prevent stolen passwords, personal data, or private information.

Beware sketchy messages. Phishy messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks.
Avoid opening links and attachments. Even if you know the sender, don’t click on links that could direct you to a bad website. And do not open attachments unless you are expecting a file from someone.
Verify the source. Check the sender’s e-mail address to make sure it’s legitimate. If in doubt, just delete the message.

Knowing what you’re up against can help you be more secure. For some examples of phishing attempts and tips on what you can do to protect yourself, check out this quick video: https://www.youtube.com/watch?v=WpaLmeHTp3I

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Thanks!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices
www.facebook.com/ASUResNet

Cybersecurity Tip #3 – Safety Tips for Mobile Devices

We are now well into Cybersecurity Awareness Month and hope some of the tips we’ve shared have been helpful. This week’s topic is how to stay safe while using your mobile device.

Today’s mobile devices — including smartphones, laptops, and tablets — are as powerful and connected as any personal computer. Remember to take the same precautions on your mobile devices as you would on your computer and STOP.THINK.CONNECT.

STOP. make sure security measures are in place.
THINK. about the consequences of your actions and behaviors online.
CONNECT. and enjoy your devices with more peace of mind.

–Always use a strong password to lock your device. If your device supports encryption, be sure to enable it.
–Enable remote wiping of your device. If it is lost or stolen, you should immediately wipe the device to secure your data.
–Think before you app: review the permissions that applications request and think twice about installing the app if it needs access to all your information.
–Connect with care. Use caution when connecting to wifi hotspots.

For additional tips on protecting yourself while using your mobile device, check out this flyer from the National Cyber Security Alliance (staysafeonline.org): Safety Tips for Mobile Devices

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Thanks!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices
www.facebook.com/ASUResNet

CS Maintenance for tonight + Cybersecurity Tip #2

***Thursday Night Maintenance***

We have several maintenance items scheduled for this evening:

First, beginning at 7:00 PM this evening, we will be reindexing and updating App Xtender.

Then, beginning at 9:00 PM, we will be installing Windows Updates to all PCs on campus. Users are encouraged to log off but leave their computers on when leaving work today to assist in the installation of these patches.

Finally, beginning at 9:30 PM, there may be brief interruptions to several back-end systems and services as we perform updates and reboots as part of the patching and maintenance process. There should be very minimal impact to campus users at this time.

***Cybersecurity Tip #2, It’s Everyone’s Job to Ensure Online Safety at Work***

When you are on the job, ASU’s online safety and security is a responsibility we all share. As the lines between our work and daily lives become increasingly blurred, it is more important than ever to be certain that smart cybersecurity carries over between the two. Check out this infographic from our friends at the National Cyber Security Alliance (staysafeonline.org) for some quick wins that can make you safer at work and more secure at home: NCSAM Infographic.

Computing Services thanks you for your patience and understanding as we perform these critical maintenance activities. As always, if you have any questions, please call the ASU Computing Services Helpdesk at 7741 or contact us via email at computingservices@adams.edu.

Have a great day!
Computing Services

It’s National Cybersecurity Awareness Month!

Now in its 15th year, National Cybersecurity Awareness Month (NCSAM) — observed every October — was created to help everyone have the resources to stay safe and secure online. This year’s NCSAM theme is Our Shared Responsibility.

We lead internet-connected, digital lives. From our desks and homes to on-the-go, we work, learn and play online. Even when we are not directly connected to the internet, our critical infrastructure — the vast, worldwide connection of computers, data, and websites supporting our everyday lives through financial transactions, transportation systems, healthcare records, emergency response systems, personal communications and more — impacts everyone. No individual, business or government entity is solely responsible for securing the internet. Everyone has a role in securing their part of cyberspace, including the devices and networks they use. Individual actions have a collective impact and when we use the internet safely, we make it more secure for everyone. If each of us does our part — implementing stronger security practices, raising community awareness, educating young people, or training employees — we will be a digital society safer and more resistant from attacks and more resilient if an attack occurs.

Throughout the month, we’ll provide some videos and other resources to get you thinking about what you can do to protect yourself and the university online.

An excellent first step in protecting your privacy is selecting strong passwords.

  • Passwords should be long and strong, instead of short and sweet, with a combination of lower/uppercase letters, numbers, and special characters. With all of these requirements, how do you choose a strong password that’s easy to remember? Check out this quick video for some tips: https://www.youtube.com/watch?v=IhlXtBNNuKs
  • Just as important as choosing a strong password is using unique passwords for EVERY site you visit. That way, even if a site is compromised, that password cannot be used to access your bank, credit cards, or social media sites.
  • For more tips and tricks in choosing and remembering good passwords, including a secure way (hint: it’s not a post-it note!) to store them, check out our Password Tips on our how-to: https://howto.adams.edu/Password_Tips
  • IMPORTANT: It is a violation of ASU policy to share your password with anyone. This includes logging in to a computer with your ASU account and letting someone else to use your workstation. All employees, including work studies, should use their own account.

Computing Services is here to help you with cybersecurity and answer any questions you may have. Feel free to contact us at (719) 587-7741, computingservices@adams.edu, or stop by our offices in the Computing Services building.

Thanks!
ASU Computing Services

Don’t forget to like us on Facebook!
www.facebook.com/ASUComputingServices
www.facebook.com/ASUResNet

Important Copyright Notice and Information for Students

As the fall semester gets underway, I’m writing to remind you of the risks involved with illegally downloading and/or sharing of copyrighted music, movies, games and software over the Internet. Unauthorized obtaining, sharing or offering such copyrighted material is illegal and in violation of U.S. copyright law. If caught, you may face severe civil and criminal penalties, including prison and monetary damages. Anyone found to have infringed a copyrighted work may be liable for statutory damages of up to $30,000 for each work and, if found to be willful, that amount may be increased up to $150,000 for each work infringed. Movie and recording companies actively monitor the Internet to identify individuals who are illegally downloading and/or sharing movies and music via peer-to-peer networks.

ASU fully complies with Federal law and takes prompt action when notified that one of its students may be illegally downloading and/or sharing copyrighted material. University Policy 500-008, Unauthorized Downloading and File Sharing of Copyrighted Digital Materials, is located on the ASU Computing Services Website in the Policies section, at https://www.adams.edu/administration/computing/. If caught, ASU penalties could include loss of access to the campus computer network, disciplinary action and in extreme cases, expulsion from the University.

You may think that the large movie or recording companies won’t bother prosecuting a single university student downloading or sharing copyrighted material. Think again. Organizations such as the Recording Industry Association of America are serious about protecting their copyrighted material. In 2009, a Boston University graduate student was ordered to pay $675,000 for illegally downloading and distributing 30 songs. This comes out to $22,500, per incident, of copyright infringement. There are a number of online sources that provide legal alternatives for downloading or otherwise acquiring copyrighted material. A listing of many of these sites can be found at: http://www.educause.edu/legalcontent.

If you have specific questions regarding ASU’s Unauthorized Downloading and File Sharing Policy please contact the

ASU Computing Services Help Desk at 587-7741 or via email at computingservices@adams.edu.

Thanks and have a great semester!