Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
height250


Image Added


Welcome to Week

1

2 of Cybersecurity Awareness Month.

 

  The theme this week is

“Own IT”

“Phone Week.

Image Removed

At the end of 2018, the  number of devices connected to the internet reached 22 billion worldwide. That’s an incomprehensible inventory of PCs, wearables, smart TVs, connected cars, smartphones and mobile devices. That said, it is more critical than ever to better understand the connected devices and applications we use daily in order to help keep our personal information safe and secure.

 

During this first week of CSAM, we will focus on what everyone needs to do to “own” – basically to keep their devices and online lives safe and secure  – both at home and in the workplace. If you think about it, inter-connectivity touches almost every aspect of our daily lifestyle whether at home with family and on go at school, work or out and about. While this constant connectivity offers countless possibilities for innovation and modernization, it also presents opportunities for potential cybersecurity threats that can compromise highly sensitive personal data.

Over the course of this week we'll have a number of items for you that will help you with securing your home and assisting the young people in your home with being more cyber security aware.  As always, you are free and in fact encouraged to share these materials with others, including your family, friends and neighbors.


Your beloved phone. It is  one of the last things you see before you fall sleep and one of the first when you wake up. During the COVID-19 pandemic, you have probably spent even more time with your phone than you usually do. Whether you want to connect with your loved ones, knock some things off your work ‘to-do’ list, or just kill time, your phone is there when you need it (except when it runs out of battery, but that’s on you). It’s time to repay your phone for all it has done for you by making sure it’s properly secured.

This week, we will give you key tips you can use to keep your phone — and the information on it — safe and sound. 

If you have any questions about our activities in October or suggestions on how to improve our cyber security efforts, please contact us at: securityawareness@royalroads.ca

Suggested Links:

“Stay Sharp on Internet Safety”   An entertaining introduction to internet security, suitable for the whole family, put together by Microsoft.

Safe On-line Surfing.  This is a great safe surfing game site for kids in grade 3 to 8 and it’s lots of fun.  Unfortunately, the school participation / exam features are not available in Canada.  ** This site is occasionally  showing an error message and not responding.  Apologies for the inconvenience.

Mad Lib #1  Here's a fun game / video  or "Mad Lib" on how attackers get into our network.  Kids will have fun with this one.  Look in the right column for the PDF answer sheet.

Great Reading:

Recruiting Spies with LinkedIn. Those of you who attended Wednesday's Lunch & Learn session led by the speaker from the Canadian Intelligence Agency will remember the discussion about how LinkedIn is being used to recruit spies, sources, etc.  The following is a New York Times article on the very same subject.

View file
nameUsingLinkedInToRecruitSpiesAbroad.pdf
height150

"Internet of Things" Tip Card.  Heard of the "Internet of Things"?  By now I think we all have.  Here's a few tips on managing your IoT devices.

View file
nameInternet of Things Tip Card_3.pdf
height150

Securing Your Kids.  Some (hopefully) helpful information for parents.  We do have additional material on this topic - pop us an email if you're interested.

 

View file
nameSSA-SecuringYourKids-Presentation.pdf
height150

Cybersecurity Crossword Puzzle. Have fun with this one.  You can email us for the answer key when you're ready.

View file
nameITS_Cyber_Security_Crossword_Puzzle.pdf
height150

Managing Mobile Apps. Helpful tips on safely managing the apps on your mobile devices.

View file
nameOUCH-201703_MobileApps.pdf
height150

 Search Yourself.  If you’ve never done an Internet search on yourself, you may be in for a surprise.  This is a good way to understand just how much of our personal information gets out onto the Internet.

View file
name201901-OUCH-January-SearchYourself.pdf
height150

Social Media Guide. Some helpful tips for social media users.

View file
nameSocial Media Guide_3.pdf
height150

Scamming You Through Social Media: Cyber criminals are everywhere...and they don't limit themselves to Phishing emails.  Here's a few thoughts on social media scams.

View file
name201909-OUCH-September-ScammingThroughSocialMedia.pdf
height150

PDF Download

View file
name201901-OUCH-January-SearchYourself.pdf
height250

View file
nameSocial Media Guide_3.pdf
height250

View filename201909-OUCH-September-ScammingThroughSocialMedia.pdf


Image Added

We’ll start by answering the question “When should I update my phone?”   The answer is surprisingly easy – see what Cyber Canada advises.

Watch here: https://www.youtube.com/watch?v=ShXCn1W-jdQ

Image Added

It may come as a surprise but you are more likely to be the biggest risk to your mobile device than cyber criminals. Fortunately there are some basic steps you can do to keep your device and the information that is stored on it safe and secure.   

Read:  OUCH-SecuringMobileDevices.pdf (attached ) 

Image Added

Apps are what make mobile devices so versatile.  They allow us to be more productive, instantly communicate, share, or just have fun.   However, with the power of all these apps comes risk.  Mobile device expert Joshua Wright has some great advice for you on managing your apps. 

Read: OUCH-SecurelyUsingMobileApps.pdf (attached)

Image Added

This is a really useful tool. The FCC in the US has put together a Smart Phone Checker. And, it's sooo simple. You go to their website, select the type of phone you have, and click the button. The site generates a checklist of steps you should take to secure your phone. How cool is that? Click on the link below to access the Smart Phone Checker site.

Link: https://www.fcc.gov/smartphone-security

Image Added

In yesterday’s session Karim talked about an “Evil Twin” attack that the bad guys can use to get control over phones connected on public WiFi.  Want to see what it looks like?  Have a look at this video and watch Network Chuck (and his kids) hack his wife at the local Starbucks. It is a bit long, and occasionally gets a bit technical, but the demonstration is easy to understand.

Watch here: https://www.youtube.com/watch?v=q7HkIwbj3CM

Image Added

Another topic from yesterday’s live event was the “SIM Swap Attack.”  This is where the cyber criminals convince your mobile provider to switch your information over to them.  It takes a bit of work but once they do it they can cause a lot of trouble.  Here’s some info on SIM Swapping and what you can do about it   

Watch here: https://www.youtube.com/watch?v=050yxHC_G8E

Watch here:  https://www.cbc.ca/news/canada/toronto/number-porting-fraud-advice-1.5377237  

Additional Resources

We've got some great tip sheets and other informative articles on the topic of mobile device security.  Have a look at the list on the right.  

Image Added

Phishing Challenge #1 

Think you’re pretty good at spotting phishing attempts?  Then you’ll have fun with this one. And, if you’re not sure, this is a safe way to sharpen your skills. 

 Phishing Challenge #1 is your chance to see how good you are at telling the difference between a legitimate  website and one that’s a phishing attempt.  It’s easy to do:



PDF Download

View file
nameOUCH-SecuringMobileDevices.pdf
height250
 
Securing Mobile Devices

View file
nameOUCH-SecurelyUsingMobileApps_en.pdf
height250

Securely Using Mobile Apps

View file
nameMobile Security Tip Card_3_0.pdf
height250

Mobile Security Tip Card

View file
nameOUCH-201702_StaySafeOnTheRoad.pdf
height250

Staying Secure on the Road

View file
nameOUCH_DIsposingMobileDevices.pdf
height250

Disposing of Mobile Devices