Personalized Scams

Cyber criminals now have a wealth of information on almost all of us. With so many hacked organizations now a days, cyber criminals simply purchase databases with personal information on millions of people, then use that information to customize their attacks, making them far more realistic. Just because an urgent email has your home address, phone number or birth date in it does not mean it is legitimate.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2MfsoyJ
via IFTTT

Ransomware

Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome if you want your files back. Be suspicious of any emails trying to trick you into opening infected attachments or click on malicious links, common sense is your best defense. In addition. backups are often the only way you can recover from ransomware.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2Dv4LNT

via IFTTT

Ransomware

Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome if you want your files back. Be suspicious of any emails trying to trick you into opening infected attachments or click on malicious links, common sense is your best defense. In addition. backups are often the only way you can recover from ransomware.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2Dv4LNT

via IFTTT

Protecting Your Social Media Account

Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2JHhEDM
via IFTTT

Virtual Private Networks

Virtual Private Networks (VPN) create encrypted tunnels when you connect to the Internet. They are a fantastic way to protect your privacy and data, especially when traveling and connecting to untrusted or unknown networks, such as at hotels or coffee shops. Use a VPN whenever possible, both for work and personal use.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2qTOk9z
via IFTTT

Virtual Private Networks

Virtual Private Networks (VPN) create encrypted tunnels when you connect to the Internet. They are a fantastic way to protect your privacy and data, especially when traveling and connecting to untrusted or unknown networks, such as at hotels or coffee shops. Use a VPN whenever possible, both for work and personal use.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2qTOk9z
via IFTTT

Two-Step Verification

Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2Frj0Ef
via IFTTT