OUCH! Security Newsletter

The IMT Security Office is pleased to be able to provide the SANS OUCH! Monthly Security Awareness Newsletter to all students, faculty, and staff.  The OUCH! newsletter provides a wealth of practical information on keeping yourself safe and secure online at home, at work, or anywhere.

OUCH! is published by SANS Securing The Human

May 2017 / OUCH! Security Newsletter

posted May 3, 2017, 10:17 AM by Shawn Kohrman

Securing Today’s Online Kids
The number of ways children today can go online and interact with others is staggering. From new social media apps and games to schools issuing Chromebooks, kids’ social lives and futures depend on their ability to make the most of technology. As parents, we want to make sure they do so in a safe and secure manner. However, this can be a challenge, as many of us never grew up in a technical environment like this. To help you, we cover the key steps to enabling today’s kids to make the most of technology safely and securely.

April 2017 / OUCH! Security Newsletter

posted Apr 5, 2017, 9:46 AM by Shawn Kohrman

Passphrases
Passwords are something you use almost every day, from accessing your email or banking online to purchasing goods or accessing your smartphone. However, passwords are also one of your weakest points; if someone learns or guesses your password they can access your accounts as you, allowing them to transfer your money, read your emails, or steal your identity. That is why strong passwords are essential to protecting yourself. However, passwords have typically been confusing, hard to remember, and difficult to type. In this newsletter, you will learn how to create strong passwords, called passphrases, that are easy for you to remember and simple to type.

March 2017 / OUCH! Security Newsletter

posted Mar 13, 2017, 2:38 PM by Shawn Kohrman

Securely Using Mobile Apps
Mobile devices, such as tablets, smartphones, and watches, have become one of the primary technologies we use in both our personal and professional lives. What makes mobile devices so versatile are the millions of apps we can choose from. These apps enable us to be more productive, instantly communicate and share with others, train and educate, or just have more fun. However, with the power of all these mobile apps comes risks. Here are some steps you can take to securely use and make the most of your mobile apps.

February 2017 / OUCH! Security Newsletter

posted Feb 6, 2017, 9:06 AM by Shawn Kohrman

Staying Secure on the Road
We want you to be able to make the most of technology at all times, including when you travel. In this newsletter, we cover how you can connect to the Internet and use your devices securely on the road.

January 2017 / OUCH! Security Newsletter

posted Feb 6, 2017, 9:02 AM by Shawn Kohrman

Social Engineering
A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, or infect your systems is by simply tricking you into making a mistake. In this newsletter, you will learn how these attacks, called social engineering, work and what you can do to protect yourself.

December 2016 / OUCH! Security Newsletter

posted Feb 6, 2017, 8:58 AM by Shawn Kohrman   [ updated Feb 6, 2017, 8:59 AM ]

Securely Disposing of Your Mobile Device
Mobile devices, such as smartphones, smartwatches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as often as every year. Unfortunately, too many people dispose of their devices with little thought on just how much personal data is on them. In this newsletter we will cover what types of personal information may be on your mobile device and how you can securely wipe it before disposing or returning it. If your mobile device was issued to you by your employer or has any organizational data stored on it, be sure to check with your supervisor about proper backup and disposal procedures before following the steps below.

November 2016 / OUCH! Security Newsletter

posted Nov 2, 2016, 9:27 AM by Shawn Kohrman   [ updated Nov 2, 2016, 9:28 AM ]

Using the Cloud Securely

“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored. Examples of Cloud computing include creating documents on Google Docs, sharing files via Dropbox, setting up your own server on Amazon Cloud, storing customer data in Salesforce, or archiving your music or pictures on Apple’s iCloud. These online services can make you far more productive, but they also come with unique risks. In this newsletter, we cover how you can securely make the most of the Cloud.

October 2016 / OUCH! Security Newsletter

posted Oct 5, 2016, 8:30 AM by Shawn Kohrman

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using or where you are using it, we recommend the following four key steps. To learn more about any of the steps below, refer to the Resources section at the end of this newsletter.

September 2016 / OUCH! Security Newsletter

posted Sep 23, 2016, 1:53 PM by Shawn Kohrman

Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can quite often be our own worst enemy when using email. In this newsletter, we will explain the most common mistakes people make with email and how you can avoid them in your day-to-day lives.

August 2016 / OUCH! Security Newsletter

posted Aug 3, 2016, 1:17 PM by Shawn Kohrman

What Is Ransomware?
Ransomware is a special type of malware that is actively spreading across the Internet today, threatening to destroy victim’s documents and other files. Malware is software--a computer program--used to perform malicious actions. While ransomware is just one of many different types of malware, it has become very common because it is so profitable for criminals. Once ransomware infects your computer, it encrypts certain files or your entire hard drive. You are then locked out of the whole system or cannot access your important files, such as your documents or photos. The malware then informs you that the only way you can decrypt your files and recover your system is to pay the cyber criminal a ransom (thus the name ransomware). Most often, the ransoms must be paid in some form of digital currency, such as Bitcoin. Ransomware spreads like many other types of malware. The most common method involves emailing victims malicious emails, where cyber criminals trick you into opening an infected attachment or clicking on a link that takes you to the attacker’s website.

1-10 of 31