“Be Cyber Wiser”, Secure File Sharing

September 22nd, 2014

What File sharing or Cloud Drive applications do you use?  Regardless of whether you use a Tablet, Mac or a PC, FAU uses a Web based application that is used to securely share files across campus and externally.  Filelocker is a secure area used for exchanging files.  Email exchange of files is not secure and has inherent limitations to the file size that can be sent attached to the email.   Don’t use email file sharing.  File Locker is secure and it gives you the ability to share Large Files.  With Filelocker your files are stored up to 30 days and the files are all encrypted.  To login to the Filelocker application here at FAU point your browser to https://filelocker.fau.edu

“Be Cyber Wiser”, Change Your Password Frequently

August 11th, 2014

You all have probably seen recent news of once again a major cyber-security breach of ID’s and Passwords by Russian Cyber Criminals.   Now may be a good time to change your Passwords.

Your password is more than just a key to your computer or online account. It is a gateway to all of your important information. If your password falls into the wrong hands, a cybercriminal can impersonate you online, access your bank or credit card accounts, sign your name to online service agreements or contracts, engage in financial transactions, or change your account information.

Unfortunately, many users are still not taking the necessary steps to protect their accounts by using strong passwords. Far too often, passwords with simple combinations such as 123456, password, QWERTY, or abc123 are being used. In other cases, people simply use their pet’s name or their birth date — information that can be easily found online, such as on a Facebook or genealogy page.

How to Create Secure Passwords:

Cyber criminals have developed programs that automate the ability to guess your passwords. To protect yourself, passwords must be difficult for others to guess but at the same time easy for you to remember. Here are some recommendations:

  • Passwords should have at least eight characters and include upper case (capital letters) and lowercase letters, numbers and symbols.
  • Avoid words and proper names, regardless of language. Hackers use programs that try every word in a dictionary.
  • Don’t use personal information — name, children’s name, birthdates, etc. that someone might already know or easily obtain.
  • Change passwords regularly — at least every 90 days. The University Maximum is 365 days after that the system will automatically force you to change your password.  If you believe your FAU or one of your personal  or an online account you access, has been compromised change your passwords immediately.
  • Use different passwords for each account you have.
  • Make sure your FAU passwords are different from your personal passwords.

 

Protecting Your Passwords:

  • DO NOT write down your passwords. If you need to remember your passwords, write down a hint to a password, but never the password itself. Store the hint in a safe place away from your computer.
  • Do not share your password with anyone – attackers may try to trick you via phone calls or email messages into sharing your password
  • Do not reveal your password on surveys, questionnaires or security forms.
  • Decline the “Remember Password” feature in browsers.
  • Always remember to logout when using a public computer.

“Be Cyber Wiser”, Data in the Cloud

July 29th, 2014

Many of FAU Students and Faculty/Staff are now using Cloud Storage for Personal use.   However, some of these Cloud storage provider’s terms of service actually do not comply with legal requirements in place by the University.  Currently, here at FAU Google Drive (as part of our Google Apps for Education) can be used  as we have a valid agreement with Google.  For more information on which Cloud Storage providers can be used at FAU please contact the OIT Information Security Office.

What is Cloud Storage all about?  Well, Cloud Storage is a service provider offering called DaaS - Data as a Service.  The Service provider will give you access to your files from an Application or Web Browser and you can move the files from/to the Cloud via the Internet.   Current popular free Cloud Storage providers are:

Microsoft OneDrive (formerly SkyDrive) - 7GB free cloud storage and integrated with all Outlook.com users

Google Drive  -  5GB free cloud storage and integrated with FAU Owl Apps and other Google Users

Apple iCloud  -  5GB free cloud storage and integrated with Apple iPod, iPhone, iPad, etc. users

Dropbox  -  2GB free cloud storage and integrated with apps for the MS Windows desktop, iOS and android devices

Personally, I would never put anything personal or private in the Cloud without encrypting it first.  I suggest that you protect your Personal Identifiable Information (PII) and don’t post it or any other sensitive information in these Cloud Storage environments.  Cloud Storage services are great for sharing pictures, music and normal documents but I would never store anything in the Cloud that could be used by the cyber criminals.

For more Cyber Security Blogs go to http://wordpress.fau.edu/security or visit our Cybersecurity site at http://www.fau.edu/security for more information.

“Be Cyber Wiser”, Lock Your Mobile Devices

June 25th, 2014

Are iOS devices more secure than Android devices?  Recent studies suggest that iOS may not be as safe given some of the Lock-Screen vulnerabilities that have been discovered in iOS.  However, all mobile devices can be compromised if the cyber attacker gets your password to unlock the device.  We need to make sure that we take our mobile device security just as seriously as our desktop security

Here are some common measures you can take to help protect your mobile devices:

  • Password protect your mobile devices.  Use PIN code or passwords or fingerprint reader if available.
  • Enable Remote locks and “Find my Phone” capabilities on your Mobile Device
  • Update the iOS and Android devices as soon as security patches come out to reduce vulnerability.
  • Don’t store sensitive work-related information on your private mobile devices.
  • Stick with acquiring conventional Apps from legitimate stores like Apple Store, Google Play and Microsoft Store.
  • Delete Mobile Applications you don’t use; if you don’t use it delete it!

“Be Cyber Wiser”: Avoid Unsolicited Email and Phone Scams

May 21st, 2014

“Be Cyber Wiser”: Avoid Unsolicited Email and Phone Scams

The Cyber criminals are hard at work pushing Malware, PHISHING, and SPAM via Unsolicited emails.   Phone scams are also becoming more prevalent.

Follow the tips below to avoid unsolicited email scams:

1.  Filter SPAM – Turn on SPAM and junk mail filters in your email software.
2.  Don’t Trust Unsolicited Email – If you get an email and you don’t know the sender or have not requested information from that source, be careful. It may well be SPAM or a phishing email.
3.  Be Cautious of Email Attachments – A good way to infect your machine with Malware is to click on an attachment from an unsolicited email. Avoid this trap by scanning all attachments with your antivirus software before you open them.
4.  Don’t Click on Links in Messages – The URL links in messages could take you to a malicious website that lures you into divulging your personal information.
Phone scams are also increasing. Watch out for scammers offering employment opportunities with a variation on the Nigerian 419 scam. The scammer offers to send you money up front in the form of a fake check. In return you wire transfer money to the scammer, who steals your funds.

Don’t fall victim to a Microsoft service scam. This one starts with a phone call. The caller says he represents Microsoft and that your computer needs repair, or that you have won the Microsoft Lottery, etc. Hang up immediately if you receive such a call. If it sounds too good to be true it probably isn’t. Microsoft does not make unsolicited phone calls to fix computers.

For more information and help on recognizing current phishing and malware attacks visit our Cyber Security Awareness web site at http://www.fau.edu/security.

 

 

“Be Cyber Wiser”: Be Careful of Tax Season Scams

April 7th, 2014

FAU Students, Faculty and Staff who have already filed their taxes this season can still be vulnerable to tax-related scams.  Many schemes take advantage of users by alleging to have information about the filer’s refund, or noting a problem with the return that you previously filed.

 If you haven’t file yet then please read the IRS recently released Dirty Dozen Scams for 2014, which highlights common scam tactics, including those that occur offline, such as criminals who impersonate legitimate charities or agencies and place phone calls to victims to solicit money.  Do not give out Personal Information to callers who are asking you to verify personal or sensitive information over the phone.

 Vigilance about the security of your online activities is required every day, but is even more important during this time of year.  Tax season can be stressful for a lot of people, and cyber criminals exploit this through targeted phishing attacks that try to scare you or entice you into clicking on a link or opening an attachment.

 Here are some basic precautions that will minimize risk include the following: 

1.         Do not respond to emails appearing to be from the IRS. The IRS does not initiate taxpayer communications through email or social media tools to request personal or financial information. The IRS does not send emails stating you are being electronically audited or that you are getting a refund. If you receive an unsolicited email claiming to be from the IRS, send it to phishing@irs.gov.

2.         Do not send personal or sensitive information in an email. Criminals may intercept the information.

3.         Do not open any attachments or click on links contained in suspicious emails. Common scams push tax rebates, offer you a great deal on tax preparation or offer a free tax calculator tool.   If you did not solicit the information, it’s likely a scam.

4.         Carefully select the sites you visit. Safely searching for tax forms, advice on deductibles, tax preparers, and other similar topics requires caution. Do not visit a site by clicking on a link sent in an email, found on someone’s blog, or on an advertisement.  The website you land on may look just like the real site, but it may be a well-crafted fake.

5.         Be wise about Wi-Fi. Wi-Fi hotspots are intended to provide convenient access to the Internet and are not necessarily secure against eavesdropping by hackers.

6.         Secure your computer. Make sure your computer has the proper security controls, including up-to-date anti-virus and anti-spyware software, and a firewall.

“Be Cyber Wiser” and “Think before you Click”  

“Be Cyber Wiser”, Protect Data in the Cloud

March 5th, 2014

Many of FAU Students and Faculty/Staff are now using Cloud Storage.  What is Cloud Storage all about?  Well, Cloud Storage is a service provider offering called DaaS -  Data as a Service.  The Service provider will give you access to your files from an APP or Web Browser and you can  move the files from/to the Cloud via the Internet.   Current popular free Cloud Storage providers are:

Microsoft OneDrive (formerly SkyDrive) -  7GB free cloud  storage and integrated with all Outlook.com users

Google Drive  -  5GB free cloud storage and integrated with FAU Owl Apps and other Google Users

Apple iCloud  -  5GB free cloud storage and integrated with Apple iPod, iPhone, iPad, etc. users

Dropbox  -  2GB free cloud storage and integrated with apps for the MS Windows desktop, ios and android devices

I would never put anything personal or private in the Cloud without encrypting it first.  I suggest that you protect your Personal Identifiable Information (PII) and don’t post it or any other sensitive information in these Cloud service environments.  Cloud Storage services are great for sharing pictures, music and normal documents but I would never store anything in the Cloud that could be used by the cyber criminals.

“Be Cyber Wiser”: Keep Your Anti-Virus Software Updated!

February 17th, 2014

What antivirus software do you use?  Regardless of whether you use a Mac or a PC, make sure you have antivirus protection on your systems and make sure you keep it updated.  Without the appropriate security patches applied, your systems and your applications are vulnerable to attacks or malware exploits.  Make it a practice to update your software regularly, on a certain day and at a certain time.   My software is set to auto update daily, at 3:00 a.m.  I also do a full security scan of my Microsoft Windows Operating system every weekend starting at 1:00 a.m.

So you may ask, what antivirus software do I use on my personal system?  I use Microsoft Security Essentials on all my MS Windows systems.  MS Security Essentials is a free product and it works well for me.  It is basically the same product as the enterprise version Microsoft Forefront security product that we use here at the University minus some of the extra bells and whistles for centralized management and management console features.

And what about you?   What do you use as an antivirus product and how often do you keep it updated?   There are lots of great products out there. The top-rated “Pay for” security and antivirus products for 2013 were  Webroot,  McAfee,  Trend Micro, and Kaspersky Labs.  If you do decide to buy an antivirus product  just be sure you keep it updated.

Finally, make sure you also keep your web browsers and plugins up to date with the latest versions and patches.   Be cyber wiser! Keep your Antivirus software updated and patched, and set to auto update.   For more Cyber-Security information please go to our web site at www.fau.edu/security or contact Larry Thomas, lthomas@fau.edu, 561-297-3259 

“Be Cyber Wiser”, Protect Mobile Devices

January 8th, 2014

BYOD is skyrocketing so we need to ensure that we take our mobile device security just as seriously as our desktop security.  First we need to lock the devices with a security code or password as a first line of defense.  Next,  don’t “jail break” your mobile devices.  Jail breaking is when you circumvent the manufacturer’s setup and operating system (OS) and basically do your own thing with the setup and security of the device.

Some common ways that mobile devices get infected is from the download of applications from different App stores.  You can easily install an infected application without knowing it.  Google and Apple stores aren’t perfect but at least some vetting takes place before apps are placed in these stores.  Here are some other measures you can take to help protect your mobile devices:

  • Password protect your mobile devices.  Use PIN code or passwords.
  • Update and patch the OS and applications on your devices to reduce vulnerability.
  • Enable encryption if possible to slow down the cyber thieves.
  • Don’t store sensitive work-related information on your private mobile devices.
  • Stick with the conventional Apps from legitimate stores like Google Play and Apple Store.
  • Pay attention to what you install.
  • Avoid opening links from sources that you don’t recognize or that appear suspicious.
  • Use WI-FI networks that are encrypted like WPA2 encryption.
  • Reduce app clutter; if you don’t use it delete it!

“Be Cyber Wiser” and keep your mobile devices’ operating systems (iOS and Android) and their Apps updated!