Personalized Scams

Cyber criminals now have a wealth of information on almost all of us. With so many organizations getting hacked, cyber criminals simply purchase databases with personal information on millions of people, then use that information to customize their attacks, making them far more realistic. Just because an urgent email has your home address, phone number, or birth date in it does not mean it is legitimate.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/33Hc0h7
via IFTTT

Identity Theft

Identity theft is when someone steals information about you and then uses that information to pretend to be you and commit crimes, such as credit card fraud. One of the key steps to protecting yourself is monitoring your financial, credit score and credit card accounts. The sooner you detect fraud in any of these accounts, the sooner you can minimize the damage.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3y9JF0Q
via IFTTT

Virtual Private Networks

Virtual Private Networks (VPN) create encrypted tunnels when you connect to the Internet. They are a fantastic way to protect your privacy and data, especially when traveling and connecting to untrusted or unknown networks, such as at hotels or coffee shops. Use a VPN whenever possible, both for work and personal use.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2Rd5xrw
via IFTTT

Anti-Virus

Make sure you have anti-virus software installed on your computer and that it is automatically updating. However, keep in mind that no anti-virus can catch all malware; your computer can still be infected. That is why it’s so important you use common sense and be wary of any messages that seem odd or suspicious.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3eXoXJ3
via IFTTT

Older Generation

Using technology securely can be overwhelming or confusing, especially for those who did not grow up with it. When helping secure those who are uncomfortable with technology focus on just the basics – 1) be aware of social engineering attacks 2) secure your home network 3) keep your systems updated 4) use strong, unique passwords 5) backup your key personal data

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3topCbm
via IFTTT

Two-Step Verification

Two-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verification for your most important accounts such as email, financial and retirement accounts.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3nFjA5b
via IFTTT

Two-Step Verification

Two-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verification for your most important accounts such as email, financial and retirement accounts.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3nFjA5b
via IFTTT

Securely Disposing Mobile Devices

Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don’t, the next person who owns it will have access to all of your accounts and personal information.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3e0VTAS
via IFTTT

Search Yourself Online

Ever wonder just how much information is publicly available about you? Ever wonder how cyber criminals harvest information and customize attacks for their victims? The technique is called Open Source Intelligence (OSINT) and it is far simpler and more powerful than you think.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/3ntGQCQ
via IFTTT