Blog Post

Cybercentry - Year of Cyber - Good Practice Guide

Leigh Cronian • 1 January 2024

1. We are all personally responsible for protecting our work and home assets, and information is one of our key assets. Report any concerns immediately. 


2. If you think an email is suspicious, at work forward it as an attachment to your IT Department or at home forward it to report@phishing.gov.uk and delete from your Inbox using Shift-Del (so it won’t be in your Deleted Items). If you think you have opened something by mistake, then report it at once. Never reply to spam email.


3. If unsure, don’t click on any links or open attachments. Use Favourites for websites you visit often. 


4. Be alert to potential targeting by social engineers and report any concerns immediately. 


5. Think before you share online - including posting on social media sites - are you giving away information which could impact on work or personal security, or could be used by a social engineer?


6. Never give sensitive information unless you are sure the recipient is who they say they are and has a valid need to know. 


7. Protect passwords - never share them or leave them where they can be found. Don’t make them easily guessable or use the same password for different applications. 


8. Don’t plug anything into the USB ports of work IT systems, not even to charge them, except for officially procured USB devices. If you find any unaccounted-for USB devices in your workplace you should hand them to your Information Security Officer. 


9. Keep your anti-virus up to date at home so that it can help reduce the risk of downloading malware. Remember that however well protected you are, nothing can guard against every threat – so be vigilant.



Articles


January


Anti-Virus


February


WiFi


March


Location Services


April


Passwords


May


Malicious Websites


June 


Social Media


July


Phishing


August


Social Engineering


September


Remote and Home Working


October


USB Use


November


Online Fraud


December


The Uncomfortable Truth



Reporting

 

The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.

Download Article

Share

by Leigh Cronian 01 Nov, 2024
Online Fraud – Don’t Be Hoodwinked. We’ve mentioned online fraud in previous articles – social media and phishing. But what is cyber fraud and how can you guard against it? This is the tenth theme in the Year of Cyber articles to help you use cyberspace safely at work and at home. Simple points to remember: 1. Don’t disclose personal details unless you know the person you are talking to or have verified their credentials. 2. Check credit card and bank statements to ensure that correct payments have been taken and no fraud has taken place. 3. Don’t assume others will protect your identity. What is Cyber Fraud? According to the Action Fraud website, Fraud is when trickery is used to gain a dishonest advantage, which is often financial, over another person. Fraud can be committed against a person, business, or an organisation. In Britain fraud costs people hundreds of millions of pounds every year and the costliest type of fraud usually occurs online, through online shopping, online banking, and ID theft. The internet has many online products and services which most people use without issue, but there are criminals who take the advantage of the worldwide web’s anonymity to hoodwink you if the opportunity presents itself. We covered social engineering (through social media) and phishing (emails) earlier this year, but other types of online fraud are: • Baiting. Commonly online this is posting video links to humorous, extreme, or lewd content to tempt people to click on the link which leads to phishing, or malware downloads. • Spear Phishing. Emails that appear to originate from legitimate organisations which contain a high degree of personal information or come from a ‘high jacked' account from your friends or colleagues. • Vishing. Telephone calls claiming to be from a trusted organisation, sometimes automated to get you to type in responses on your keypad to capture identity or financial information. • Smishing. A text message containing links to a false website to get you to input information. • Impersonations. Fraudsters impersonate persons of authority to gather information or gain access to secure areas, or harvest information under the guise of campaigning or conducting a survey. What is the risk? Not only might you lose money against something you pay for but don’t receive, but you might also have unexpected payments taken, even amounting to emptying your account. Your information can also be used to commit identity theft, opening accounts in your name, and destroying your credit rating, or to commit further fraud through posting material which appears to come from you. Clearing up the mess can be very costly and time-consuming. So, what can I do? Fraudsters rely on people to be ignorant of technology and what it can do, so the best defence is to really get to know the capabilities of your mobile device, smart phone, or tablet. Set up the security settings correctly and change default passwords and settings. Be suspicious of phone calls you weren’t expecting, especially from banks or people asking for your financial information – your banks website will tell you what information it will ask you for. It takes two people to terminate a phone call so ring back on a different line or call someone you know and trust first. Be suspicious of any emails you weren’t expecting from banks, credit card companies or other official organisations - especially if they ask for personal information or bank details. Don’t reply to unsolicited emails from companies you don’t recognise. Think about the ‘jigsaw’ effect and your online footprint - can a fraudster piece together information about you by searching across different social media and open-source channels to find an ‘in’? Fraudsters also set up false social media profiles to elicit information from their intended victims, be careful of friend requests, especially friends of friends (a common tactic to gain credibility). Always research any new online retailer you want to shop with or organisation you want to deal with. Look for trusted recommendations, privacy policy, returns policy, company address and telephone contact details. Make sure the website has a padlock symbol in the browser window frame and starts with https:// - the ‘s’ stands for ‘secure’. Always log out of sites into which you have logged in or registered details. Closing your browser is not enough to ensure privacy. As with most types of fraud, if something doesn’t feel quite right, it probably isn’t. If you feel you have been a victim of fraud then contact your bank, building society etc. as soon as possible so that changes can be put in place and transactions stopped. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Oct, 2024
USB Use – Keep It Clean. The Year of Cyber, we are running a series of articles to help you use cyberspace safely at work and at home. This month we look at USB use – not just USB storage devices but anything else you can plug into a computer’s USB socket. Two simple instructions to remember are: 1. Don’t plug anything into the USB ports of organisational systems, not even to charge them. Only use officially procured devices on systems as this will reduce the risk of data loss and spreading malware. 2. If you find any unaccounted-for USB devices in your workplace you should hand them to your Information Security Officer. What is a USB device? USB stands for Universal Serial Bus – basically it is a standard defining the connection which allows devices to be plugged into the USB socket on a computer. These devices can be memory storage devices (often called USB drives, flash drives or memory sticks) or other devices (such as mobile phones, cameras, and music players) which can transfer data or receive power. What is the Risk? USB drives can hold large amounts of data and are small enough to be easily lost or stolen. While they have been used to remove data from organisations, they are also often used to spread malicious software (also known as malware – worms, viruses etc). Unfortunately, they are difficult to virus-scan properly, so it is difficult to know that they are safe unless they are from a trusted source. Only officially procured USB devices are permitted on organisational systems, to reduce the risk of both data loss and spreading malware. It’s a good idea to be careful at home, too. ‘Free’ USB sticks from exhibitions or other sources might come with unwanted ‘gifts’ of malware. It is not just USB memory sticks that are a problem. Any device with a USB connector can be used to spread malware, even if you are only connecting the device to recharge it. Just inserting the device into the USB socket will start it working. Even the most unlikely-sounding device may present a danger – such as a charger for e-cigarettes. It is also not just computers that can be affected. In one incident a contractor unknowingly used an infected USB on his work laptop. The virus was discovered once the USB was used on the contractor’s internal network and, specifically, on equipment that was used to update software on vehicles. Due to the way in which the software was updated, there was a real concern that the virus could have spread on to the vehicles themselves. An incident like this could have a very serious effect. Sanctions There have been cases where USB devices (such as mobile phones and MP3 players) have been plugged into organisational systems and have been confiscated, even destroyed. The individuals responsible have also been subject to disciplinary action. Given the risk that these devices might pose to an organisation it is sensible to look after these systems – and we are all responsible for maintaining the security of our working environment, including an organisation’s networks and systems. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Sept, 2024
Home and Remote Working – Are you being careful? Many of us work from home, or other locations, either regularly or occasionally. It can help maintain a good work / life balance, but are there any specific cyber risks we should be aware of? And it’s not just home – what about other remote locations, such as public transport or hotels? This is the ninth in the Year of Cyber articles to help you use cyberspace safely at work and at home. Simple points to remember: 1. We are all responsible for protecting work and home assets, and information is one of our key assets. Report any concerns immediately. 2. Be alert to your surroundings – can anyone overlook or eavesdrop on what you are doing? 3. Take the minimum you need and keep access tokens and passwords separate from devices. Home working or remote working? Remote working is any kind of work done outside your normal place of work – whether you are accessing, storing, processing or simply discussing organisational information. Home working is a specific type of remote working, where you work regularly or occasionally from your home, either because of personal circumstances or because (for occasional home working) you need to concentrate on a specific piece of work. Both remote and home working can offer flexibility to support work / life balance – which helps both individuals and organisations. Organisations encourage flexible working, and provide IT equipment to support it, including laptops and smart phones. Some services and networks, such as organisational portals can also be accessed remotely from personal devices. What is the Risk? Whenever you are working outside the office, there is always a risk that you will be overlooked or overheard. Even small pieces of information can be pieced together and can be useful for an adversary – and working on a document, or talking on the phone, about something which is obviously related to work is often enough to pique the interest of those around you. Even when you are in your own home, overlooking and eavesdropping can be an issue. There have been instances where information has been passed to others by family members who have seen documents or information on a laptop and not appreciated the sensitivity, sometimes with serious repercussions. And what about workmen and other visitors to your house - often they are the reason you may be at home in the first place. Personal devices (smart phones, tablets, laptops etc) and online accounts do not have the same level of protection as those provided by an organisation (although even these cannot guarantee total security), and so should not usually be used for organisational work, except for services specifically designed for use with them. And remember that any organisational information on your personal devices is also subject to release in line with Freedom of Information and Data Protection legislation. There is also an increased risk of malware from imported files, and from equipment being linked to our networks. Last year there was an incident where a contractor picked up a virus from his home PC and spread it using his laptop as he visited different sites. While organisational systems are well-protected against malware, no system can guarantee complete protection against everything, so we all need to be careful. And of course, there is always the risk of leaving something behind – dropping or forgetting documents or devices when you leave the train, café or wherever – or of equipment being damaged or stolen. So, it’s a good idea to check you have everything before you leave a remote location. So, what can I do? Remember that you are personally responsible for securely handling any assets entrusted to you – this includes information. Try not to draw attention to the fact that you are working on organisational information and be alert to anyone showing undue interest in your work – report any concerns immediately to your line manager or Information Security Officer, including loss or possible compromise of equipment or information. Take the minimum of information you need and keep papers and screens out of view from others – use a laptop privacy screen if appropriate – and lock them away, if possible, when not in use. Keep access tokens (e.g security ‘dongles’) and passwords separate from devices, and shut down unattended devices, rather than leaving on standby so that the encryption on them is enabled. Take care that you are not being watched as you type your password in – the normal rules about avoiding being overlooked apply. Use Organisation-provided equipment where possible, but if you must use your personal device then make sure it is patched and uses anti-virus software and firewalls, and is password protected. Remember that email over the Internet is like sending a postcard in the ordinary mail – anyone can read it during its journey. Get Safe Online has good advice to help you protect your personal equipment. Sanctions We are all responsible for maintaining the security of our working environment, including an organisation’s networks and systems. If you put sensitive organisational information at risk, whether at work or through outside activities, you should expect action to be taken against you. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Aug, 2024
Social Engineering. By nature, we humans like to be helpful. But that can make us prey to social engineers, who will manipulate us to get what they want – be it personal details, sensitive information, or fraud. Social engineering plays a part in several cyber threats – see the previous articles on Malicious Websites, Social Media, and Phishing. Simple points to remember: 1. Be alert to potential targeting by social engineers and report any concerns immediately. 2. Never give sensitive information unless you are sure the recipient is who they say they are and has a valid need to know. 3. Think about what you are posting on social media sites and in out of office messages – could these be used by a social engineer? What is social engineering? You are going into a building and see someone struggling to carry bags or boxes, so you hold the door open for them to enter without swiping – but are you sure they should be let in, or have you just fallen for a social engineer’s trick? Or you answer a call from a helpdesk engineer, or at home from your bank, asking about a problem on your system or account which you weren’t aware of. Or you receive an email telling you about a parcel or an invoice you weren’t expecting. Any of these could be social engineering – a confidence trick to get you to give away access to facilities (whether buildings or IT systems) or information. Social engineering includes phishing, scams, and impersonation – it’s all about manipulating the victim, as in the BBC television series ‘Hustle’. Social engineers exploit human psychology. They know that humans are inherently helpful and will feel an obligation to someone who seems to have helped them, or is in a position of authority, or is facing the same sort of problems – like IT that is not working or a boss demanding tough deadlines. They will set up a situation to gain this sense of obligation or sympathy. Social engineers are also good at building a jigsaw from different pieces of information to get a complete picture – so rather than random phishing they might carefully craft an approach. Clever callers will also trick you into “verifying” their identity by keeping telephone lines open after suggesting you call someone in authority (your bank, perhaps) to verify their identity – it’s all part of the confidence trick. What is the Risk? A well-known convicted (now reformed) hacker has claimed that he could usually get sensitive information just by asking for it using social engineering tactics. However good technical security measures are, humans are always the weakest link. If you give information or access to a social engineer, they can use this to attack you (such as by emptying your bank account or committing identity theft) or to attack your organisation (such as by gaining access to our systems or by tricking you into loading malware). They might also use information from you to make an attack on another individual more convincing – perhaps telephoning your colleague when you are away to get information on a project, they say they are working on with you. So, what can I do? Never give sensitive information unless you are sure the recipient has a need to know. Helpdesk engineers will never ask you for passwords, and nor will your bank. Whether at work or at home, ask yourself if a request for information is reasonable. Think twice about responding to discounts or other offers if you don’t know the sender already – these can be methods of harvesting information. If a caller suggests you confirm their identity by calling a trusted organisation (such as your bank or a helpdesk), then always use a phone number you already have, not one they give you, and if possible, use another phone to prevent them from keeping the line open. If using another phone isn’t possible, then hang up for at least five minutes and then call a friend whose voice you recognise before you call the trusted organisation. Never insert a USB stick or CD-ROM that you have found into your computer either at work or at home – social engineers exploit our natural curiosity by leaving computer media where they know people will find it. Think about what information you are giving in out of office messages: are you giving away information about your whereabouts, or your and your colleagues’ work interests? What are you posting on social media? Is there information which could be used by a social engineer to manipulate you or your friends and colleagues? Remember that you are personally responsible for securely handling any assets entrusted to you – this includes information. If you have any concerns or think you may have been the target of a potential social engineering attack, then report any concerns immediately to your line manager or Information Security Officer, including loss or possible compromise of information. Get Safe Online has good advice to help you protect yourself against social engineering, and the Police Action Fraud website has more advice to protect you from identity theft. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Jul, 2024
Phishing – would you spot it? Don’t be a victim. Trials conducted suggest that we are not as good at spotting phishing as we think we are. In a survey nearly 90% thought they could spot a phishing email leaving around 10% not sure. However, in a recent exercise 20% failed to spot an obvious one - clicking on the links which could have potentially downloaded malicious software. The cyber hero is an employee, who thought the email looked suspicious and forwarded it to IT Department - all within the first minute. Would you have fallen for the emails? The concern for organisations is that with one in five taken in by this simple phishing email it implies that more carefully crafted are likely to get through. The bottom line: we all need to be more vigilant. Social engineers will try to manipulate us to get what they want. Phishing is one of those ways – and it presents a serious threat to organisations as well as to us in our personal lives. This is the seventh in the Year of Cyber articles to help you use cyberspace safely at work and at home. Simple points to remember: 1. If you think an email is suspicious, at work forward it as an attachment to your IT Department or at home forward it to report@phishing.gov.uk and delete from your Inbox using Shift-Del (so it won’t be in your Deleted Items). If you think you have opened something by mistake, then report it at once. Never reply to spam email. 2. If unsure, don’t click on any links or open attachments. Use Favourites for websites you visit often. 3. Never reply to spam email. Would you have fallen for this? We recently sampled several personnel to get a view of how vulnerable we might be to a phishing attack. While most staff are confident that they would spot a phishing email, the trial showed how easily many are taken in – although being summer holidays a lot of emails were probably unopened. What is phishing? Email is great for communicating, but it can be used to send junk mail (spam) or malicious phishing emails which entice you to give away information or download malware. Social engineers will construct an email carefully to encourage you to act on it. This might be about a parcel delivery or invoice that you weren’t expecting, or perhaps an offer of a discount, or something about a system upgrade inviting you to enter your details. There might also be a degree of urgency – suggesting that if you don’t respond now then your account will be closed, or you will lose a discount. The common thread is to get you to open an attachment (which may contain malware which will then infect your system) or click on a link (which may infect your system with malware, or may ask you to enter your details, including passwords). Unfortunately, phishing attacks can be very well crafted, which can make them hard to spot, and may include logos to make you think they are from legitimate sources (such as HMRC, banks, parcel delivery firms). Or they might use a slight variant of a name – one colleague spotted that an email was from “paypai” rather than “paypal”, which isn’t immediately obvious from a quick glance. Phishing can also be very carefully targeted (“spear-phishing”) using information about you gained from social media or even business cards. What is the Risk? If you enter information on a link in a phishing website, you are giving the information away to whoever owns that website. So, if you enter your bank login and password then the phisher can pretend to be you and empty your account or use the information you have provided for identity theft. Even if you don’t enter any information, simply by visiting the website linked in the email or opening an attachment may result in malware being downloaded on to your device – and in the case of a network this may mean other users are affected, and that the malware can access any information on that network. The risk is serious. There have been some very well-crafted phishing attacks which have targeted employees, as well as more general phishing campaigns. And anyone can be a target – everyone really is in the front line in cyberspace. Remember that no system can ever be completely secure – anti-virus and spam checkers can’t identify everything. Most phishing emails achieve success quickly: the recent trial conducted by the Year of Cyber resulted in several clicks within a minute of the email being sent – too soon for any external reporting to identify the risk. So, what can I do? If you think an email is suspicious, at work forward it as an attachment to your IT Department or at home forward it to report@phishing.gov.uk and delete from your Inbox using Shift-Del (so it won’t be in your Deleted Items). If you think you have opened something by mistake, then report it at once. Never reply to spam email. Were you expecting the email? If it was unexpected and you haven’t ordered anything, treat it as suspicious. If you know the sender, contact them to check it is real. If it is about a system upgrade, have you seen anything about this on the Internet? Does the email ask you to disclose information? Are any links what you would expect? Are they to external websites? Could they be misleading in some way? A common ruse is to put the purported sender somewhere within a website address, so it looks plausible but not quite right. Alternatively, hovering over an address with your cursor might show that what you see in the email is not the same as the actual address it will take you to. Avoid clicking on links in emails - use Favourites for websites you visit often. If it sounds too good to be true, then it probably is. Are you being asked for more information than you would expect to get that discount? Don’t make purchases or charity donations in response to unsolicited spam emails – they can be scams. Never reply to spam email – that confirms that your email account is live and may result in you getting more spam in the future. Don’t enter organisational usernames or passwords on external websites and take care with the information you give out on social media or at events. Remember that you are personally responsible for securely handling any assets entrusted to you – this includes information. If you have any concerns or think you may have been the target of a phishing email, then report any concerns immediately to your line manager or Information Security Officer, including loss or possible compromise of information. Get Safe Online has good advice to help you protect yourself against phishing. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 May, 2024
Malicious Websites – What to look out for? We all use a range of websites every day, whether finding information for work or checking the news, shopping, or banking at home. Most of these are perfectly trustworthy, but what about those that aren’t? Simple points to remember: 1. Avoid clicking on links in emails unless you are certain the message is genuine. Use Favourites for websites you visit often and use reputable organisations wherever possible. 2. Don’t enter sensitive information unless you’re sure you are on the right website – and that it is secure. 3. Keep your anti-virus up to date at home so that it can help reduce the risk of downloading malware. What do you mean by a malicious website? Most of the people we know are trustworthy. But unfortunately, we’ve all met some people who aren’t – the sort who seem nice to your face and then say something else behind your back, or those who would trick or even steal from you. And that’s pretty much the same with websites – most are fine, but some are out to trick and steal from us. A malicious website looks like any other but is either a tool for getting information from you directly (your bank login details, for example) or for putting some malicious software (malware) on your system to steal your information or take your system over for someone else’s use (often to send spam). A common way of encouraging you to go to a malicious website is through a link in a phishing email, so never click on a link unless you are certain it is correct – it’s far better to type links into your browser to ensure you are going where you want to (or use your usual search engine or Favourites). What is the Risk? Malicious websites will either capture your details (and use these for social engineering, identity theft or fraud) or will install malware on your system without you knowing. The malware might be a keystroke logger (which reports back everything you type) or might start searching your system, or the whole of the network you are using, and send interesting files to an adversary. The consequences could be very severe. While some networks will block access to many sites which are potentially dangerous, it can’t identify all malicious websites, as more are springing up all the time and new malware is constantly being developed, no system can guarantee to protect against everything. So, it’s up to all of us to be vigilant – to think before we click. Alerts are raised when users view inappropriate content on some networks and recognised malicious software attempts to download on to the user’s computer. Networks blocks access to many of the websites which typically contain malware, such as gambling and pornography websites which will download as users click images and links. But it’s not only inappropriate sites which can host malware – in November 2013, the popular humour site cracked.com was compromised with a malicious JavaScript insert that would force a download of a malicious document. Fortunately, some networks were protected in this case by several technical measures, but these can’t always be relied on 100% as the threats become ever more sophisticated. At home, the consequences of identity theft or fraud can be serious, and an attacker might take over your system to send spam or commit further fraud and attacks. As noted above, it’s best to avoid high risk sites like gambling and pornography sites. Also beware of scams, like bogus charity sites – often set up during well publicised disasters like famines and earthquakes) – Get Safe Online has excellent advice on donating safely to charities online to help you ensure your money goes to the charity you want to give it to, not to fraudsters who might use your information for identity theft, and the bogus website itself may host malware. So, what can I do? To check the links in emails, hover over the hyperlink to check the actual address (shown when you hover over) is the same as the hyperlink shown in the text. It is generally good practice to avoid clicking on email links and instead type links into your browser or use your usual search engine – or use your Favourites for websites you visit often. And avoid entering personal or other sensitive information into websites unless they are secure (address shows “https:” rather than “http:”). Use your common sense. Does the website look strange in any way? Is the URL spelt correctly and what you expect it to be? If you right-click a hyperlink and select “Properties” you will see the real destination of any hyperlinks on the site – are these what you would expect? Is it offering you something that seems too good to be true? (If so then it probably is.) Is it asking for more information than you would expect to have to give? Finally, don’t click on pop-up messages, even if they are telling you your computer may have a virus – this is a common ruse used by malware authors to get you to reveal your credit card numbers or even to download malware. Sanctions We are all responsible for maintaining the security of our working environment, including work’s networks and systems. Action is taken against people who put this at risk, including through inappropriate web browsing – and where that browsing is also illegal it can lead to prosecution. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Apr, 2024
Who are you? Passwords – the key to your identity. Passwords are commonly used to prove your identity to your computer and to a host of other applications. That means that getting them right – both memorable and secure – is important. This is the forth in the Year of Cyber articles to help you use cyberspace safely at work and at home. Simple points to remember: 1. Use strong passwords (using 3 random words). 2. Protect passwords - never share them or leave them where they can be found. 3. Frequently changed passwords often lead to weaker, reused passwords, compromising security. What is a password? Okay – I know you already know the answer - passwords are those strings of letters and numbers that we must use to log on to our computers, and on to a host of other applications at work, and banking and social media at home. But what are passwords? Passwords are the most usual way to provide your identity on a computer system – the technical term is authentication. As humans, we recognise our friends – so effectively seeing their face or hearing their voice is often enough for us to know who someone is. But if you don’t know who someone is, you might ask for proof – possibly their passport or their security pass, depending on the circumstances. Basically, your username is your means of saying “it’s me” to the computer, and the password is your proof that “this really is me” (like your passport). If you think about a password this way you can see why they are important, even though they might sometimes seem a nuisance. Why so many passwords? Think for a moment about your house, your car or bicycle, the locker you use at the gym, possibly even a desk or cupboard at work. They all have keys - different keys. Some, like your house, have complex locks and keys that are hard to break, others don’t – it depends on the impact of someone else getting the key. Passwords are the same – some need to be secure, others less so. It depends on what the password is protecting and the impact of someone “breaking in”. You wouldn’t have the same key for your house, car, and desk, as anyone who got one of your keys could then open all of them. It’s the same with having different passwords for different applications. That said, it is frustrating to have to log on separately to different services at work and at home, so a single sign-on solution to support Identity and Access Management (IdAM), should be used. What is the Risk? If you use weak passwords, or the same passwords for different applications, it makes it easy for people to impersonate you. Depending on the system and application, they might be able to access sensitive information (emails or staff reports, perhaps), send emails in your name or access your bank account. Good passwords, that you keep secure, can help to protect you against fraud and identity theft. Passwords also need to be something that can’t be easily guessed. So, anything about you, as well as ordinary dictionary words, are out, unless you can combine them in more secure ways. Criminals can easily run searches of dictionary words, and of common phrases (including celebrity names, films, and TV programmes) and even foreign words. Anything that might be easily known about you (including from your social media profiles) is also easy for them to find. So, you might love your dog, or be a committed football fan, but “Rover”, “GoldenLabrador” and “ManchesterUtd” would not be very good passwords. But there’s a balance – good passwords don’t have to be impossible to remember. Misuse really does happen. In one example, an employee received a warning after leaving their user login and password details in an unlocked desk while they went away, and the login had then been used by another person to access inappropriate websites. Only evidence that the employee had not been in the country at the time of the breach prevented further action being taken against them. So, what can I do? System Administrators enforce good passwords by offering consonant-vowel-consonant triplets with numbers. If you need to write them down in full then remember that they must be marked at the highest classification level allowed on the relevant system and kept in an appropriate secure cupboard. A better idea, if you need a written record, is to write them in a private ‘code’ others would be unable to guess and protect this suitably. Alternatively, think of ways to remember them by making the triplets into words to tell a story – e.g “yog” could suggest yoghurt, or a youthful old granny! (This is the same technique of creating a story used by those performing memory feats.) Make Them Hard to Guess. New guidance from the National Cyber Security Centre (NCSC) is to use three random words, although you can use numbers and special characters if you wish. Avoid words or anything that might be associated with you. So, a proud dog owner might want to consider something more complex, perhaps an image of a Rover chasing a ginger cat down Oxford Street, and take the first 3 letters of "chasing", "ginger" and "oxford" to give "chaginoxf" Never share passwords – if someone has a legitimate reason to do something, they should have an account set up to allow them to do it. Giving them your password is like giving them the keys to your house when you aren’t there. If you need to give a colleague access to an email account, then do it through proper mailbox delegation. Also, helpdesk staff never need access to your password, so be very suspicious of anyone who requests it. Take care that you are not being watched as you type your password in – the normal rules about avoiding being overlooked apply. Reconsidering frequent password changes is advised, as it may lead to weaker security practices. Emphasis is now on strong, unique passwords and multifactor authentication (MFA) to counteract sophisticated cyber security threats, moving away from routine password resets unless a compromise is detected. And don’t leave them where they can be found – so not on sticky notes under the keyboard, or in your notebook. Get Safe Online has good advice on protecting your passwords at home – including making sure you don’t use administrator accounts on your home PC for routine access, which will help to protect you from the effects of malicious software. Sanctions We are all responsible for maintaining the security of our working environment, including an organisation’s networks and systems. Action is taken against people who put this at risk, including through password misuse. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Mar, 2024
Location Services – What are you telling them? Mobile devices and social media are great for finding restaurants and other facilities near you, and there are apps which help record your fitness activities, as well as the value of sharing photos with family and friends online. But are you sharing more than you intend to? This is the third in the Year of Cyber articles to help you use cyberspace safely at work and at home. Simple points to remember: 1. Think about what you are posting online and review your privacy and security settings regularly. 2. Follow the rules for wherever you are – such as not using mobile devices. 3. We are all responsible for protecting all work and home assets, including information. Report any concerns about information you find online immediately. What are location services? In short, anything with location data attached to it – so obviously apps which show directions from where you are, but also digital photographs, fitness and online dating apps, some aspects of social media and even mobile games. And the list goes on… Mobile devices “know” where they are by using Global Positioning Services (GPS) – that’s great for apps which help you find your way around, but there can be a downside if you don’t think about what you are posting and where you are checking in. Photographs from mobile devices like smart phones, for example, include metadata which describes where and when a photograph was taken and even what device it was taken with. It’s the digital equivalent of the captions we used to put in photograph albums or write on the back of the print (e.g “London Bridge, 17 August 2023”) – except that it’s automatic, so you don’t need to do anything, and more precise, so it records exactly where you were when you took the picture. Fitness apps like Strava and MapMyRun will track your progress in training, identifying where and when you have cycled or run, and how you have performed against previous rides or runs – and how you have performed against others. And of course, there is the option of “checking in” at wherever you are to help your friends know where to find you. All these are examples of what is called “geotagging” – attaching location data to what you are doing. What is the Risk? Publicly announcing where you are presents obvious risks to personal security. While you may be happy for your friends to know, unless your social media profiles are protected then anyone can see it, and you could be cyberstalked. And when you check in to that restaurant in Leeds or post the photos you took on the beach in Blackpool earlier today (and the metadata will give the date), then you might be unintentionally telling a thief that you aren’t at home (and are unlikely to be tonight). Pattern of life information can also be gleaned from checking in and fitness apps if you visit the same bar every Thursday evening or run the same route every Tuesday lunchtime – and if your run starts and ends at a work location then anyone (including those with ill intent) would probably be right in guessing you have a connection with the company. There have been recent occasions when information on Strava.com not only showed routes starting and ending at companies, but also linked to personnel profiles and even to a running club which listed its members (with photographs). This presents a clear risk to personal security. So, what can I do? Think about what you are posting, including what you might be giving away inadvertently. Review your privacy and security settings for all sites and online apps and don’t link everything back to a single social media profile (e.g your Facebook page). Don’t assume that others want their details made public – this might be colleagues, club members or even family – and don’t check them in or post their details without permission. Turn off the GPS facility on your device when you don’t need it. Consider where you might be giving away pattern of life information that could put you or your colleagues at risk. Keep to any rules about not using mobiles devices or cameras at specific locations – the rules are there for a reason. Remember that you are personally responsible for securely handling any assets, including information, entrusted to you. So, think about the potential impact of information about work and home assets, including images and location data. Get Safe Online has good advice to help you protect yourself against cyberstalking and an informative blog about keeping safe on social networking and with location services. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Feb, 2024
WiFi – who are you connecting with? This is the second in the Year of Cyber articles to help you use cyberspace safely at work and at home. This month we look at WiFi – wireless networks that let you stay connected wherever you are. A few simple points to remember: 1. Take care when using WiFi hotspots. Make sure that you are connecting to the hotspot you expect. 2. Avoid entering sensitive information on public WiFi, and only do so if you’re on a secure website. 3. Make sure that your personal WiFi network has password protection enabled. What is WiFi? WiFi (also spelt as Wi-Fi or Wifi) allows computers, smartphones, and other devices to connect to the Internet or communicate with one another wirelessly. It is increasingly common in homes and public places (wireless hotspots). All of this is good to help you stay connected, and to be free to keep in touch, access services or work in different locations – this will become increasingly important as we embrace new ways of working. But WiFi does have some specific risks you should be aware of. What is the Risk? The biggest issue with WiFi is confidentiality – if the WiFi network isn’t encrypted then others using the network can see whatever you are doing online – this includes the capture and copying of your passwords and sensitive information. Public WiFi hotspots are often not encrypted, and it is not always easy to tell who they belong to hacking into them can be child’s play, as recently demonstrated by a 7-year-old. In public places WiFi hotspots can be spoofed, so that you may inadvertently connect to a bogus network (an “evil twin”) which masquerades as a legitimate one. Such networks are used to capture your data or direct you to fraudulent websites and may have a very slight difference in name to the access point you are expecting. If you suspect you may have connected to a spoof network, you should remove this from your saved networks to reduce the chance of connecting to it again. Remember, it is good practice to avoid entering personal or other sensitive information into websites unless they are secure (address shows “https:” rather than “http:”). Always be careful that you are not overlooked. Organisational information should not be accessed or processed in a public place using a WiFi hotspot. However, you can work on information in your home or hotel room. Any breach of confidentiality could provide adversaries with enough information to launch an attack on organisational networks. In a worst case this could have serious consequences resulting in loss of capability. At home, it’s also important to keep your WiFi connection secure, to prevent unauthorised access to your network. If you don’t, unauthorised users may be able to access your information, take up your bandwidth and download allowance, or use your system to hide criminal activities. So, make sure you enable password protection and if possible, change the password. Get Safe Online and the Information Commissioner’s Office (ICO) have more in-depth information. Check that your smartphone or tablet isn’t set to connect automatically to available open WiFi networks – this will help prevent you connecting to unsafe networks, and you’ll save battery life as well! Sanctions Appropriate action is taken on any security breaches, and we are all responsible for maintaining the security of our working environment, including an organisation’s networks and systems. But there may also be serious consequences for you if you don’t secure your home WiFi. There have been instances of paedophiles using neighbours’ unsecured WiFi to cover their tracks – which have resulted in innocent people being investigated by the police. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
by Leigh Cronian 01 Jan, 2024
Anti-virus – how well are you protected? This is the first of our articles to help you use cyberspace safely at work and at home. This month’s theme is Anti-Virus, but it includes other tools that can help you at home, like Firewalls, and advice for smartphone and tablet users. Simple points to remember: 1. Make sure you have anti-virus software and a personal firewall to protect all your personal devices (including tablets and smartphones) – and that they are always enabled. 2. Keep your anti-virus software, operating system, and other key software (e.g, word processing) up to date. 3. Remember that however well protected you are, nothing can guard against every threat – so be vigilant. What tools can I use to protect me online? We are used to protecting ourselves, our loved ones, and our property – vaccinating our children, fitting good locks to doors and windows, and using them, watching out for suspicious activity. Tools like anti-virus software and firewalls are similar – they work to stop viruses and other cyber threats by strengthening our defences (like a vaccination or a lock) or by looking out for suspicious activity – a bit like a Neighbourhood Watch for your computer system! Anti-virus software looks for viruses and other malware by scanning incoming emails, monitoring files you open or download and websites you visit to ensure there is no embedded malware and scanning your device periodically for malware or spyware (spyware, as the name suggests, snoops on us to steal our online secrets like passwords or credit card details). There are several anti-virus packages, some free, some paid for, but they will all require regular updates to make sure they recognise the latest malware – usually this happens automatically. But anti-virus software can’t protect you against spam or any criminal or hacking activity not connected with a known virus, and it can only defend against what it knows about – so anything new or different may not be identified. A firewall acts as a barrier between your computer and the Internet, only letting connections in or out of your computer if they seem legitimate - like a good lock on the front door that stops a thief breaking into your house, or from removing your property through the front door if they managed to get in through a window. A firewall is intended to be the first line of defence, but it won’t guard against viruses or spam, or if it’s been turned off or the settings are wrong. For home users, a personal (or software) firewall is usually adequate, such as the Windows Firewall included with Windows operating systems, or one included with some anti-virus packages. You should have a firewall and anti-virus on every device that connects to the Internet. That includes smartphones and tablets, as well as computers and laptops, irrespective of their operating systems. Get Safe Online has good advice on choosing and using anti-virus software and firewalls. But they won’t protect me against everything? Nothing can. Just as a determined thief will always find a way, and a new strain of flu may not be prevented by a flu vaccination, nothing can ever be guaranteed to keep you safe. So, you still need to be vigilant for suspicious activity – as we’ve covered throughout the year in these articles. What about my smartphone and tablet? Smartphones and tablets are increasingly being targeted by malware – criminals go where they get the most return for their efforts, so as the number of people using these devices has increased, so the malware threat has increased. As well as getting malware from websites (especially from links sent in text messages) and email, they also come with infected apps – especially those not coming from the official app stores. As well as the usual malware threats, smartphones can be targeted to force premium rates calls and texts to be made without your knowledge. Although infected apps have on occasions got on to official app stores, be careful only to purchase and download apps from recognised sources. Take particular care if you find a free or cheap version of an app you would normally have to pay for – it is probably not legitimate and may come with additional malware “features” that you really don’t want. And check what access the app is asking for on your device – they can ask for access to contact lists and call lists, as well as the camera, microphone, location information, photos and even permission to send texts and make calls. Get Safe Online especially warns users of Android or Windows devices to install a reputable anti-virus and anti-spyware app. Is there anything else I can do? Generally, keep your operating system and software up to date. That means downloading updates from the suppliers – usually this can be done automatically as updates become available – and not running old versions of software after support has been withdrawn. Malware writers know that not everyone will update their software so they will still have success with malware targeting older operating systems, browsers, and other software. Don’t be one of their successes. In particular, keep your browser software up to date – install the latest version of your browser from the supplier’s site to protect yourself and to enjoy the new features to help with speed and compatibility. But, as with all updates, ensure you are downloading from the official sites. Also make sure the settings are appropriate – you can help on this from your browser’s help files and from sites such as Get Safe Online. Backup your important data regularly to an external hard drive or to the Cloud. That way you won’t lose all your important documents and photographs if your device fails, is damaged or stolen. And finally, when disposing of your device, make sure you do so safely and securely so that your data cannot be accessed by others. Get Safe Online has good advice on these points and on other ways to protect yourself online. Reporting The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.
Show More
Share by: