Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This week focuses on how to secure yourself at work

Learn about:

  • CEO Fraud
  • How to recognise a Phishing email
  • Targeted attacks

Cyber security IS an issue at Royal Roads.  Consider the following:

  • RRU rejects, on average, approximately 28,000 SPAM / Malware emails per day, with about 450 making it to our 3rd level filters.
  • Our remote access server gets over 20,000 failed logon attempts per day

This week we will provide you with some great information on how you can be more secure at work.  Check back through the week as we will be posting resources all week long.

Want to know more about cybersecurity in the workplace?  The Security Awareness team has a series of short seminars that they will present to your team in your office.  Email securityawareness@royalroads.ca for more information. 

Fun Stuff

The number of cyber attacks demonstrates the need for greater vigilance and proactive security measures on the part of individuals.

Welcome to Week 2 of Cybersecurity Awareness Month.  The theme this week is “Secure IT”.

This week's theme represents a call to individuals to take the steps necessary to aid in their collective and individual cybersecurity.

The good news is that many of these steps are easy to take. This call to action  recommends that individuals begin to protect themselves against cyber-threats by learning about the security features available on the devices and the software they use. This can be as simple as understanding the need for creating strong and unique passwords for each device and application. But creating strong passwords, while a great start, is not all that’s needed. Updating the software on their user devices is another example of how individuals can improve their personal and digital security by simply learning about - and using - the security features already available on their devices.

The Zero Trust Mantra

Finally, experts recommends that when individuals are online they adopt the tenets of what is becoming the hottest buzz in the cybersecurity field: zero trust. Zero trust basically means to trust no one, or thing online and so verify the identity of everyone or everything. Whole security systems architectures by major cybersecurity vendors, such as Symantec, are based on the zero trust model. Zero trust reflects the reality that traditional security models are ineffective in today’s world of public Wi-Fi, the cloud, etc. 

Extending the zero trust concept to shopping online and email dramatically lowers the chances that bad guys will gain access to personal information. Simply put, if one only uses a credit card or other payment system in an encrypted, secure payment website, the chances of that information being stolen is greatly decreased. Similarly, if an individual takes the attitude that I will want to verify the identity of any email that seems different or odd in even the slightest way, the chances of falling for a phishing attempt decrease significantly as well.

If you have any questions about our activities in October or suggestions on how to improve our cyber security efforts, please contact us at: securityawareness@royalroads.ca

Lift a glass to cy-beer-security            A popular Czech brewery’s take on cybersecurity. 

360% More Ransomware                     A quick outline of what is currently the most serious cybersecurity threat, and not just in the US but in Canada and around the world. 

How Phish-prone Are You?                 10 questions that will help you (or your family / friends) determine how “phish-prone” you are. 

Have I been Pwned?                              Created by an internationally recognised cybersecurity researcher, this site is a repository of email addresses & passwords                                                                                   compromised in data breaches.  Check out your passphrase / email address…but be prepared for a surprise!


Here's a great quiz from Phishing.org called “How Phish-prone are you?” It’s an easy-to-follow quiz that helps you see just how prone to phishing attacks you might be.  Here’s the link: http://www.phishing.org/how-phish-prone-are-you 


 Further Reading

Email Do's & Don'ts.


Email has become one of the primary ways we communicate in our personal and professional lives. However, we can often be our own worst enemy when using it. In this newsletter, we will explain the most common mistakes people make and how you can avoid them in your day-to-day lives.

 OUCH-201407_enEmail.pdf

PDF Download

View file
nameSTH-NCSAM2016-Week02-OUCHNewsletter.pdf
height250
Image RemovedImage Removed