Cyber Security

The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience. Do remember: Cybersecurity is much more than an IT topic.” - Stephane Nappo

Best Practices & Keeping You Safe

 

Passwords

  • Complexity

    • Measure of how difficult a password is to guess in relation to any number of guessing or cracking methods.

    • Uppercase letters, lowercase letters, base 10 digits (0 through 9), special characters (~!@#$%^&*_)

    • Nonsensical, non-dictionary-based, and has not been used previously.

    • Passwords should have at least 12 characters.

  • Rotation

    • If you use the same password for all your accounts, if one gets hacked, you should assume the others will be as well.

    • Regularly updating your passwords means that even if someone finds an old or saved password, it will no longer be useful, and your data will be secure

    • As annoying and time consuming as this is, it will save you! Personally, I recommend changing your passwords AT LEAST every six months.

 

Two-Factor Authentication (2FA)

  • Providing two different authentication factors to verify yourself.

    • A password/PIN + code sent to your phone.

    • A password/PIN + form of biometrics (face scan, finger print, or retina scan).

 

Social Engineering

  • At its root, social engineering is a range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

  • Recognizing types of social engineering:

    • Phishing - sending fraudulent communications that appear to come from a reputable source.

    • Pretexting - asking certain information, stating that it is needed to confirm the victim's identity.

    • Baiting - using false promises to lure a victim into a trap which may steal personal information.

    • Quid Pro Quo - characterized by a “give and take” exchange. It means something for something.

    • Tailgating - closely following an authorized person into a restricted access area.