Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Image RemovedImage Added

Welcome to Week 2 3 of Cybersecurity Awareness Month.  The theme this week is “Phone Week“Your Internet Footprint.”

Your beloved phone. It is  one of the last things you see before you fall sleep and one of the first when you wake up. During the COVID-19 pandemic, you have probably spent even more time with your phone than you usually do. Whether you want to connect with your loved ones, knock some things off your work ‘to-do’ list, or just kill time, your phone is there when you need it (except when it runs out of battery, but that’s on you). It’s time to repay your phone for all it has done for you by making sure it’s properly secured.

This week, we will give you key tips you can use to keep your phone — and the information on it — safe and sound. What do we mean by “Internet Footprint”?  Is it the comments you tweet on Twitter?  The photos you post to Instagram or what you share on Facebook?  Well, yes BUT there’s a lot more to it than that.  And, does it really matter?  Well, we think it does and this week we’ll give you some insight into your Internet Footprint and why you need to at least be aware of the effects of your online activity.

If you have any questions about our activities in October or suggestions on how to improve our cyber security efforts, please contact us at: securityawareness@royalroads.ca

Image Removed



This Week's Resources

Image Added

We’ll start by answering the question

“When

“Why should I

update

care about my

phone

digital footprint?”

  The answer is surprisingly easy – see what Cyber Canada advises

 The Internet Society  has a great explanation – check out “Four Reasons to Care About Your Digital Footprint.

Watch here: https://www.youtube.com/watch?v=

ShXCn1W-jdQ

Image Removed

It may come as a surprise but you are more likely to be the biggest risk to your mobile device than cyber criminals. Fortunately there are some basic steps you can do to keep your device and the information that is stored on it safe and secure.   

Read:  OUCH-SecuringMobileDevices

Ro_LlRg8rGg

Image Added

As you’ll see during this week, it’s important to protect your privacy and the information you share online. The more attackers can learn about you the better they can create a targeted attack. So, what can we do about it?  Well, let’s start by seeing how much of your information  is out there.     

Read:  201901-OUCH-January-SearchYourself.pdf (attached)

 

Image Removed

Apps are what make mobile devices so versatile.  They allow us to be more productive, instantly communicate, share, or just have fun.   However, with the power of all these apps comes risk.  Mobile device expert Joshua Wright has some great advice for you on managing your apps. 

Read: OUCH-SecurelyUsingMobileApps.pdf (attached)

Image Removed

This is a really useful tool. The FCC in the US has put together a Smart Phone Checker. And, it's sooo simple. You go to their website, select the type of phone you have, and click the button. The site generates a checklist of steps you should take to secure your phone. How cool is that? Click on the link below to access the Smart Phone Checker site.

Link: https://www.fcc.gov/smartphone-security

Image Removed

In yesterday’s session Karim talked about an “Evil Twin” attack that the bad guys can use to get control over phones connected on public WiFi.  Want to see what it looks like?  Have a look at this video and watch Network Chuck (and his kids) hack his wife at the local Starbucks. It is a bit long, and occasionally gets a bit technical, but the demonstration is easy to understand.

Watch here: https://www.youtube.com/watch?v=q7HkIwbj3CM

Image Removed

Another topic from yesterday’s live event was the “SIM Swap Attack.”  This is where the cyber criminals convince your mobile provider to switch your information over to them.  It takes a bit of work but once they do it they can cause a lot of trouble.  Here’s some info on SIM Swapping and what you can do about it   

Watch here: https://www.youtube.com/watch?v=050yxHC_G8E

Watch here:  https://www.cbc.ca/news/canada/toronto/number-porting-fraud-advice-1.5377237  

Image Added

Not all of your Internet footprint is data you have chosen to share. Most of the websites you interact with are capturing portions of your activity and sharing them with data mining services.

Blacklight is a website that examines the websites you use and shows you what tracking activity happens on that site.  It’s a real eye-opener!

Try it: https://themarkup.org/blacklight


Image Added

This one’s for the kids.  Safe Online Surfing is a site developed by the FBI in the US to teach kids good online practices.  They have a separate game for grades 3 to 8; each game is followed by a quiz. 

Try it: https://sos.fbi.gov/en/  

Additional Resources

We've got some great tip sheets and other informative articles on the topic of mobile device security.  Have a look at the list on the right.  

Phishing Challenge #1 #2 

Think you’re pretty good at spotting phishing attempts?  Then you’ll have fun with this one. And, if you’re not sure, this is a safe way to sharpen your skills. 

 Phishing Challenge #1#2 is your chance to see how good you are at telling the difference between a legitimate website  email and one that’s a phishing attempt.  It’s easy to do:



PDF Download

View file
View file
nameOUCH-SecuringMobileDevices.pdf
height250
 
Securing Mobile Devices
View file
nameOUCH-SecurelyUsingMobileApps_en.pdf
height250
Securely Using Mobile Apps
nameMobile Security Tip Card_3_0201901-OUCH-January-SearchYourself.pdf
height250
Mobile Security Tip Card
View file
nameOUCH-201702_StaySafeOnTheRoad.pdf
height250
Staying Secure on the Road
View file
nameOUCH_DIsposingMobileDevices.pdf
height250
Disposing of Mobile Devices 
Search Yourself