National Cyber Security Awareness Month 2019

Greg Price

Observed every October, National Cyber Security Awareness Month is committed to encouraging personal accountability, securing behaviors, and maintaining digital privacy in our ever-changing and connected world. The initiative was created as a joint effort between the US government and industry to foster access to resources that advocate methods for staying safe online, as well as securing your personal information.

For 2019, the theme will emphasize personal accountability and promote the significance of being proactive in securing your cybersecurity at home and at work. The theme for 2019 is Own IT. Secure IT. Protect IT.

“Own IT” suggests that you should understand completely your digital profile, or, your digital footprint.

All of us are surrounded by a vast array of electronic devices. Increasingly, those devices are connected to the internet. Think about your home, school, workplace and transportation: technology surrounds you. The proliferation of and our dependence upon the devices present opportunity for progress and an equal opportunity for negative interactions. When our technology is constantly “connected”, the likelihood for both good and bad increase.

In order to “Own your IT”, you must understand the devices and applications that you use every day. Are you using the tools correctly? Is your personal information safe?

An inescapable aspect of safe computing is understanding your privacy settings. And there’s no place where security settings and safe practices are more important than social media.

Thankfully, many developers have begun to present security settings to the end-user rather than burying them, or, choosing basic default settings on your behalf during the installation and ensuing update process.

How can you secure social media and interact with the tools safely?

Social networking sites like Facebook, Instagram, Snapchat or messaging platforms like Slack, WhatsApp or Skype provide an easy method for sharing or communicating globally with friends and co-workers. Technology often strives to present an easy-to-use interface, these tools embrace the idea of intuitive design. Have you ever read a manual on Facebook, Skype? I suspect the answer is no. Typically, we install, create an account and wander through the environments, learning as we go.

Yet, we know from poor experiences that the ever-present bad guys are watching these platforms. Are you conducting yourself in a safe manner, are your habits placing you, your family and co-workers at risk?

“Own” these tools by using the technologies safely and securely.

Passwords are unavoidable for the moment. Despite the inherent weaknesses with passwords, they serve as your first-layer of protection. As a result, password behavior needs to be strict. For each of your accounts, including social media, use unique, complex passwords. Do not use the same password or variations of the same password for your accounts: create different passwords for everything. Using a unique password for each account shields your other accounts from compromise if one account is hacked.

Despite much discussion about passwords, users continue to create poor, weak passwords. Using simple passwords is not only a bad practice, but, it places makes your data vulnerable. Think for a moment about the data you house in your phone, your work environment. If that data were suddenly placed in a public forum for all to see, would you have any concerns? Would your employer have any concerns? How about your family?

Clearly, it is impossible for users to remember scores of passwords. Employ a password manager. The tools will safeguard your password, and, they can create unique, complex passwords for you.

Additionally, enable multi-factor wherever possible. Multi-factor authentication only allows access to your information and services when two or more pieces of evidence are provided successfully. The routine often uses something that you know and a random piece of information that only you can generate or receive.

The internet is a global forum. Think of it as a very public window into billions of lives. Whenever you chose to post information about yourself or others, assume everyone will have the ability to read it. In doing so, hopefully, you will think twice about what you post.

Limiting the details of what you post restricts the potential for misuse of your information. Bad guys often use social media posts as a window into your world. If you post frequently, use caution when describing personal details. The more information you reveal, the greater opportunity for someone to target you in a negative fashion.

Don’t accept the default security settings.

After installing an app, installing an update or registering for an account, your next step should be enabling and customizing the privacy controls. Read the settings carefully. Enable only the settings that make you feel comfortable. And, keep in mind that the settings will often change, especially during an update – make a habit of checking your privacy settings.

Be considerate of what you post of others and expect the same from them. If you notice that someone has posted something that invades your privacy, ask them to remove the content. If a stranger posts inappropriate content about you, contact the service provider’s abuse department.

A hefty dose of skepticism and paranoia will increase your vigilance. Beware of common tricks. Don’t respond to odd, emergency-riddled messages. Simply delete the content and report to your employer, or, if a friend sent the message, contact the person through a different communication channel. For example, if you received a bizarre email message from a friend, call the friend and determine if they sent it.

Don’t let your technology “Own” you. Take careful steps to review your tools and use safe computing habits at all times.