![]() ![]() ![]() ![]() |
|
Q4 | 2020 ![]()
Anonymity online isn’t automatic and should not be assumed anymore. Just about anything we do or say online is in the public domain. The very open-and-everywhere nature that makes Cloud applications so useful also means that once our data is uploaded, it’s out of our hands and hosted on servers that could be anywhere, under anyone’s control. |
|
no more
|
close upOur user accounts define our online presence. The digital information there is just as valuable to criminals as anything in our wallets or purses. Keep them close and keep them closed:
check up![]() Keep track of what you share and with whom. Verify friend or follower requests in person or ask a mutual colleague for a reference. Verify any links, attachments, downloads, or emails sent to you before opening or sharing. Consider that even a trusted friend may have been hacked. If you get a confusing or out-of-context message, use a different contact method, such as a phone call or a text, to confirm that your friend actually sent the message in question. Don’t use third party apps or add-ons until you’ve read the privacy policy and you understand the extent of the information you are sharing. Beware of “clickbait”, social media quizzes that require you to authorize an app to see the results. Many are outright traps designed to capture information that will enable cybercriminals to impersonate unsuspecting users online. lock up![]() It’s equally important to physically secure all of your devices wherever you are. Even if a thief doesn’t have the skills to break your devices’ security (and potentially all your passwords and personal information), if it is stolen you won’t have access to the device, or anything on it.
back upOne of the things the Cloud is great at is preserving information. It’s never been easier to maintain a thorough backup schedule. It’s as easy as setting an alarm clock. And if a backed-up device fails or goes missing, it’s a relatively simple matter to restore the missing data and continue working. Back up your devices regularly to protect important information. For extra security, set a schedule – maybe every three months – for changing the passwords you use to access Cloud-based storage or applications. clean up![]() And finally, remember that whatever you post online is likely going to stay online, and it will only get more widely accessible over time. Even if you delete posts or photos from the social media interface, those records are still stored on a server somewhere, completely out of your control and often with questionable security that will only get worse with age. When closing down old accounts, read site policies carefully and take steps to secure your information. |
dhs sopDepartment of Homeland Security Standard Operating Procedures: Own IT
Secure IT
Protect IT
National Cybersecurity Awareness Month |