I recently completed two Cyber Security classes provided by TEEX, a Training and Education Division of the U.S. Department of Homeland Security.  I wanted to learn how local communities prepare for and respond to cyber threats and I hoped the training would allow me to make a positive contribution to my readers and my community. The training was excellent.  Clearly, I can make a difference, and so can you!

Cyber Security Class

Cyber Security Training – Riverside Sheriff’s Dept.

The Anatomy of a Cyber Attack

Cyber attacks come in many forms. Attacks can be unstructured and random or they can be highly structured, organized and intentional. A “virus” requires human assistance to spread  while a “worm” is automated as it seeks out vulnerabilities and spreads quickly on its own.  “Trojan Horse” attacks may appear to be helpful but have hidden malicious code.  An example of this was seen years ago when people downloaded pretty screensavers and then discovered they had downloaded malware which slowed down their computers and forced those computers to participate in a Denial of Service Cyber Attack.

Cyber attacks can go into action immediately or they can remain dormant for a while until a certain date or instance of vulnerability presents itself. (Time/Logic Bomb or Backdoor/Trapdoor)  The name or type of attack is not what matters.  When it comes to Cyber attacks, what matters is being prepared, being aware and then having the knowledge to deal with the situation or to get the right type of help as soon as possible to reduce or eliminate negative consequences.

Your Relationship to Cyber Attacks

Question:  What is impacted by cyber (computer systems and networks)?

Answer:  Everything!

  • Your homes, offices, schools and communities
  • Critical infrastructures (emergency services, communication, power, water, banking, transportation, hospitals, oil and gas)
  • Industry
  • Government

Question:  How can you make a difference, especially if you don’t work in public service?

Answer:  By getting informed.

  • Since the ignorance or mistake of a single person can cause harm to many, the more educated we are, the safer and better off we all will be.  Gaining knowledge may help you recognize important warning signs and guide you to react appropriately.  Let me explain …

1.  Don’t become a victim of phishing at home, school or work

Phishing for Private Information

By now, you’ve likely received a phishing email or two.  I get several a week. Mine have claimed to be from Bank of America, America On Line, Twitter, Chase Bank, UPS and Paypal, to name a few.  Initially, they were clearly fraudulent, but recently, many are appearing more legitimate and professional and therefore more dangerous.

Clicking on a malicious email link or downloading a bad attachment can ruin a computer, infect a network and lead to financial and identity theft. At home, you and your household members are at risk.  At work, this number can multiply quickly as it impacts other employees and customers of that business.  Imagine what type of damage could occur after clicking on a malicious link or downloading a virus on a hospital or bank computer and network. The breach of privacy and potential financial loss could be huge.  Even worse, imagine what damage a cyber attack can do to critical infrastructure!  Having no electricity or transportation or communication as a result of a cyber attack can have detrimental consequences.

We must all be vigilant and know how to avoid phishing schemes at all times. Awareness should begin at home and continue everywhere else.  We must think carefully about any link we click on regardless of who it appears to come from.  For more details, read How to Avoid Phishing Scams.

2.  Keep virus protection current and install patches and updates at home and at work

Antivirus Software

Always use Antivirus protection

Use good virus protection.  Run virus scans regularly and always keep the software updated.

  • Do not ignore messages on your computers and cell phones that ask you to update your system and your software as these updates often include important security corrections. Install updates and patches promptly to stay protected against security threats.

    Adobe Update

    Install updates to stay secure

  • Discuss Cyber Safety with all family members so all family members consistently take the necessary steps to protect themselves and therefore each other, especially when using the same network.
  • Some businesses have departments to handle virus protection and updates for you.  But, if they don’t, discuss this with your employer to see the best way to consistently handle this at work.

Until I attended the training, I didn’t realize how far reaching the consequence of phishing could be. I’ve never clicked on a phishing email link and I’ve accidentally assumed a legitimate link was not okay.  But I’d rather err on the side of caution.  If you have any comments or questions about this, please ask away.

Read Part II of this article for less obvious but important suggestions to keep your family, your household, your work community and of course, yourself, out of cyber trouble!

Until next time… Stay Cyber Safe!

 

* This article was updated on 9-12-12 to include links to Part II

12 Responses to Cyber Security: 2 ways to Protect yourself, your Family and your Community – Part I

  1. Thanks Haley for a great article. What virus software do you recommend for personal computers? I have been victimized by a ton of phishing emails lately and have almost been tricked into downloading the attachment because they are looking less and less like spam.

    • Hayley Kaplan says:

      Thanks, Lisa. I have also been getting way more phishing emails than ever before and you are right – they are looking more professional than ever before. I use McAfee on all of my computers and it’s worked very well for me. I used to use Norton antivirus but found it caused me all sorts of headaches and conflicts with other programs on my computers. There are a lot of options out there to pick from and different people have different reasons for their preferences. Kasperskys and Bitdefender are popular but I can only speak from postive personal experience on McAfee.

  2. Kristy says:

    Great article on the dangers that lurk online. In line with this topic, I wanted to share information on a great new (and free) app for Facebook that was designed to protect kids from online predators. It’s worth checking out—RedFlag (redflag.com). Thanks again for the stellar info!

    • Hayley Kaplan says:

      Hi Kristy,

      I’m always interested in learning about useful tools that can help protect anyone, especially children, from the dangers of the internet. Please will you take a moment to provide a few details about the RedFlag app? I’ve learned to be cautious and wary of tools that are free because it is so easy for free to be combined with malware. Please can you address this concern so parents can feel confident about testing out your app?

      Look forward to hearing more.

      Thanks.
      Hayley

      • Kristy says:

        I’m happy to offer more information for parents about RedFlag and address your core concern of “malware.”

        First and foremost, I completely understand the concern of free apps and malware. Rest assured that accepting RedFlag will not install anything on your computer. The main focus at RedFlag is to provide parents with a powerful parental monitoring tool for Facebook. In fact, one of the co-founders is a parent whose child fell victim to a predator on Facebook. His response to was to take action—creating an app to address the growing security threat to kids in the social media space.

        Second, in reference to your request for more information on the app, the following is a short overview:

        RedFlag was developed as a plug-in to Facebook to help parents better monitor who is contacting their children. It’s a non-intrusive parental monitoring service that continuously scans the child’s database of Facebook friends using algorithms built to identify suspicious characteristics and alert parents of potentially risky or inappropriate profiles. Consider an example: a 14-year-old girl with thousands of photos and a high volume of postings; thousands of male “friends” ages 12/25 all over the country; and did not attend a school in the same state as her “friends.” All of these elements are highly suspicious. In fact, this profile actually belonged to an adult male predator, and was the very profile (from his son’s Facebook account) that prompted RedFlag’s co-founder to create the app.

        Once parents are alerted to “risky” profiles, they can review them and mark them as “safe” or “restricted.” Additionally, the app does require that the child accept the parent’s request to monitor their Facebook page, so it’s nothing “behind the scenes” or invasive.

        Parents can go to the website (redflag.com) for more information or to watch the developer’s video (http://www.redflag.com/overview) explaining how RedFlag came about.

        • Hayley Kaplan says:

          Thanks for the explanation, Kristy. RedFlag sounds like a valuable resource for parents.

          Is there anything more you can provide interested parties to address the malware concern? While I have no reason to mistrust your assurance, these days it’s unfortunately not enough. Please understand I am not trying to be difficult but I am super-aware of the growing cyber issues and I have to be careful before recommending a product to anyone. Do you have any additional verifiable information to make parents more comfortable about trying the app?

          Thanks again.
          Hayley

  3. Lyn says:

    I agree with BH Mom. Your articles are always excellent.
    Lectures by you would make everyone more aware of the dangers out there. They have certainly helped me!

  4. Faye says:

    This was a very helpful article. Every one must read this. Thanks again Hayley.

  5. BH Mom says:

    Thanks for sharing – and caring:) Never thought about how one clueless person could affect so many. You should consider teaching classes on this stuff!

Leave a Reply

Your email address will not be published. Required fields are marked *

Share →