Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This week focuses on the steps people can take to protect themselves from cyber criminals, both at home and at work.

Learn about:

  • Ransomware
  • Two Step Verification
  • How to recognise a phishing email

Cyber security IS an issue at Royal Roads.  Consider the following:

  • RRU rejects, on average, approximately 28,000 SPAM / Malware emails per day, with about 450 making it to our 3rd level filters.
  • In the last 24 months RRU has:
    • experienced a “Ransomware” attack that encrypted business-critical files on our “O” Drive;
    • dealt with TEN separate email account compromise incidents that can be traced to ONE specific incident of an employee responding to a PHISHING email.
    In the last 8 weeks 6 staff / faculty members have had their email account compromised because they responded to a PHISHING email

    The stereotype of the hacker as a disaffected teenager sitting in his parents' basement breaking into websites for the fun of it is long dead.  For the past decade or so cyber criminals have been actively engaging in a variety of illegal activities with one goal in mind: to make themselves richer.  If they have to encrypt your files with ransomware or steal your identity or scam you into letting "Microsoft Support" connect to your computer then that's what they WILL do.  It's a complex, world-wide scenario that will only continue to grow as we become more and more dependent on being connected. What can YOU do about it?  Funny you should ask.....

    This week we will provide you with some great information on how you can be more secure at you can protect yourself from cyber criminals both at home and at work.  Check back through the week as we will be posting resources all week long.

    Want to know more about cybersecurity in the workplace?  The Security Awareness team has a series of short seminars that they will present to your team in your office.  Email securityawareness@royalroads.ca for more information. 

    Further Reading

    Cybercrime Inc: How hacking gangs are modeling themselves on big business:

    http://www.zdnet.com/article/cybercrime-inc-how-hacking-gangs-are-modeling-themselves-on-big-business/

     

    PDF Download

    View file
    nameSTH-NCSAM2016-Week03-OUCHNewsletter.pdf
    height250