Friday

Living The Human Firewall Life

From the 10D Monthly Security Awareness Newsletter

The 5 Traits of a Human Firewall 
The security of our organization depends upon you, the human firewall. You help prevent security events and control the input and output of sensitive information by exhibiting these five traits. 

Trait 1: Thinking before clicking
Phishing attacks remain the top strategy in every cybercriminal’s playbook. They flood organizations with emails containing malicious links and documents, knowing that all it takes is one click. Generic attacks are easy to spot, thanks to their poor grammar, spelling, or awkward phrasing. Others take a much more sophisticated approach, as in the case of spear phishing, which targets specific people and organizations. A human firewall reads emails carefully, hovers over links to display the full URL, and treats all requests for sensitive data with skepticism.

Trait 2: Using situational awareness 
Situational awareness simply means minding your surroundings, staying alert, and never making assumptions. For example, if you see an unfamiliar person in an area normally reserved for authorized personnel, or notice a secured door left open, don’t ignore it! Maintain a clean desk so as not to lose sensitive materials, and shred those materials when no longer needed. When traveling or working remotely, keep an eye on your personal belongings, stay alert for shoulder surfers, and use discretion when accessing or discussing highly sensitive information in public. These are all basic, non-technical behaviors of a strong human firewall.

Trait 3: Respecting privileged access
Access includes everything from login credentials to badges or keycards that allow you to enter secured areas. Respecting access means ensuring that whatever clearance you’ve been granted never gets misused for any reason. It means closing and locking doors, preventing tailgating (when someone slips in behind you without you knowing), never allowing someone to borrow your credentials, locking workstations when not in use, and maintaining strong, unique passwords for every account and every device.

Trait 4: Reporting incidents immediately 
Incidents happen. Reporting them immediately is the only way we can mitigate damages and reduce future risk. It doesn’t matter how big or small the incident seems. A secure door left open, an unknown individual hanging around the office, a phishing email, a smart device or computer malfunctioning—we rely on strong human firewalls like you, to inform us of these types of incidents as soon as possible. If you see something or hear something, say something!

Trait 5: Always following policy 
Human firewalls always follow our organization’s policies and never circumvent them for any reason. Why is this so important? Because policies define our security culture. They set the standards for how data is collected, stored, transferred, and destroyed when no longer needed. They exist to ensure that the privacy of our employees, clients, consumers, and partners remains intact. Failure to follow policy could lead to data breaches, ransomware attacks, or other damaging security incidents. And while we require that you know and follow our policies at all times, we also encourage you to ask questions when you’re unsure of something.

Tuesday

Back to School Edition: Keeping children CyberSafe

Start With These 11 Easy Tips to Keep Kids Safe Online:
1.   Talk to your kids!
2.   Turn on the "Do Not Track  Tool" on your browsers.
3.   Read the Privacy Policies on all the services and apps you use.
4.   Never share passwords and make strong passwords.
5.   Keep personal information personal (don't chat/send photos to strangers).
6.   (For Kids) Ask permission before signing up for anything.
7.   Know how to recognize ads and don't click on them.
8.   Respect age limits on all social networking sites.
9.   Set privacy settings on all social networking sites.
10. Advocate for Cyber Civics lessons at your school!
11. Talk to your kids!

This is a good link to send to your teens. Yes they will roll their eyes at you when you require them to read it but the constant nagging reminders WILL help protect your teens from the bad guys (If they do bad things, they are bad guys regardless of their gender) included in this link is how to best set the security settings for Facebook, Twitter, and Instagram. G+, Tumblr, Meetme and a new one I just found to be rising in popularity TikTok, all have security settings that need to be changed to protect your teen, your family network, your business network and potentially you, the parent, personal information.  We do not recommend Snapchat, because of the false sense of anonymity young users experience.  The false sense of secrecy encourages teens and young adults to post things in Cyberspace that they would never want to be revealed to the world.  


For Teachers: This site has 3 good cartoon-like video stories about Cybersecurity with good discussion stating questions. https://www.esafety.gov.au/education-resources/classroom-resources/challenge

8 questions about Windows 7 End of Life - #3 of 10 Cybersecurity for 2020

Frequently Asked Questions: Windows 7 End of Life (EOL) We know it is not easy to make changes, especially to the computer that you are f...