Issue link:

Contents of this Issue


Page 3 of 3

SPRING 2018 SECURITY SMART 4 For more information on staying safe online here at BSU or at home, contact Security Smart is published by CSO, the leader in news, analysis and research on security and risk management. © 2018 IDG To purchase an individual subscription, email or for more information. Mobile Device Maintenance 101 T AKING THESE BASIC steps will help you keep your mobile de- vices, and the information they contain, safe and secure, according to Stop.Think.Connect., a global online safety awareness campaign supported by a group of private companies, nonprofits and government organizations. Keep your mobile phone and apps up to date: Your mobile devices are just as vulnerable as your PC or laptop. Having the most up-to-date security software, web browser, operating system and apps is the best defense against viruses, mal- ware or other online threats. Think before you app: Information about you, such as the games you like to play, your contacts list, where you shop and your location, has value—just like money. Be thoughtful about who gets that information and how it's collected through apps. Delete when done: Many of us download apps for specific purposes, such as planning a vacation, and no longer need them afterward, or we may have previously downloaded apps that we no longer find useful or inter- esting. It's a good security practice to delete apps you no longer use. Secure your devices: Use strong pass- words, passcodes, touch ID features, or a combination to lock your devices. These security measures can help protect your information if your devices are lost or sto- len and keep prying eyes out. Be savvy about Wi-Fi hotspots: Pub- lic wireless networks and hotspots are not secure, which means that anyone could potentially see what you are do- ing on your mobile device while you are connected. Limit what you do on public Wi-Fi and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network (VPN) or a personal mobile hotspot if you need a more secure connection on the go. "Can I just get your phone number?" "Please fill out this form." These requests seem harmless, but sharing too much information about yourself can have a downside. Specifically, if you share per- sonally identifiable information—called PII—you put yourself at risk for identity theft. PII includes the following: ■ name ■ date of birth ■ Social Security number ■ home address ■ email address ■ passwords ■ family members' names and PII Here are five tips for handling your PII securely: 1 Remember that in most cases, you are not obligated to supply your PII. If the cashier at the drug store requests your phone number or email address, for example, it's fine to say politely, "I'd prefer not to give that out." You'll still be permit- ted to buy your toothpaste and nasal spray. if you pick the security question "What high school did you attend?" you could list your alma mater as Superstar High. (Be sure to invent something you can easily remember.) That way even some- one who has your data won't be able to access your accounts so easily. 5 Protect—or shred—your paperwork. In this digital age, it's easy to forget that documents like canceled checks and credit card statements are still a gold mine for crooks. 5 Tips for Avoiding Identity Theft 2 Before you give any information, ask how it will be used. When a form or a person requests your phone number, ZIP code, or any other PII, find out what it's for. Ask who will be able to access the information, how it will be protected, and how long and where it will be stored. If you aren't satisfied with the answers, don't give out the information. 3 Guard your Social Security number. Very few entities truly need your Social Security number, so decline to provide it unless you are absolutely sure it's neces- sary. An identity thief can use the num- ber to open bank accounts or lines of credit in your name, borrow money, and even apply for government benefits. 4 Make your online accounts difficult to hack. Choose security questions that no one but you can answer. Personal details such as your previous addresses, schools you've attended, even your moth- er's maiden name are relatively easy for a motivated hacker to dig up. For extra se- curity, make up the answers. For example, DID YOU KNOW? The volume of email messages containing malicious attachments spikes more than 38 percent on Thursdays over the average weekday volume. Wednesdays are the second most popular days, followed by Mondays, Tuesdays and Fridays. SOURCE: PROOFPOINT'S 2017 HUMAN FACTOR REPORT

Articles in this issue

Links on this page

Archives of this issue

view archives of BSU - Security_Smart_Spring2018_BSU