Security Awareness Training Blog

Relevant articles to keep you informed and up to date!

Security Awareness Training Alert - Virtual Kidnapping

Written by

Imagine that you receive a phone call from a number you do not recognize. On the line, the caller tells you they have kidnapped your loved one and you hear a voice (that could be your loved one) screaming and crying for help in the background.

They know your loved ones’ name and have information that makes the call seem real. To release your loved one safely, the criminals demand payment via Western Union or other forms of online payment.

What would you do?

This is the setting for an ongoing crime called virtual kidnapping. The criminals in this scam usually have done their homework including researching the victims’ social media sites and even hacking into the victim’s phone or computer. 

Read more...

Yes, your Apple Mac device can get a virus!

Written by

Security awareness training tip -

Yes, your Apple Mac device can be infected with malware.

Don't let your employees fall into a false sense of security.

Recent Apple TV ads seem to be providing misleading information.
 
Covered in the Malwarebytes article - Mac security facts and fallacies
 
Read the article here: 

Fallacy: Macs don’t get viruses

Fallacy: Macs are more secure than Windows

Fallacy: Macs don’t need security software

Fact: There’s not much Mac malware out there

Fact: macOS has built-in anti-malware software

Get the straight scoop here:

Malwarebytes Article - Mac security facts and fallacies

Read more...

Fake News and the Value of Security Awareness Training

Written by

Fake news articles have become a hot topic in the political arena recently. However, accusations of fake news articles have been around since the 1950’s with tabloid gossip magazines like the National Enquirer. Over the years, numerous print magazines have been accused of publishing sensationalized false news articles about celebrities for the simple purpose of selling more magazines.

Web sites like Snopes.com and other “fact checker” sites have been around since 1995 to help with the verification of “urban legends” and fake articles on the Internet.  

Read more...

Presidents Day - The Importance of Security Awareness Training

Written by

I started my law enforcement career in 1978 when Jimmy Carter was in office. I was working in the heart of Silicon Valley at the Mountain View Police Department. At that time, we had no idea how computers and the Internet would play such an important part in our lives.

Since 1978, the following Presidents have been in office: Jimmy Carter, Ronald Reagan; George Bush; William J. Clinton; George W. Bush; Barack Obama and Donald J. Trump.

Our society now recognizes that for every new President, computer security has become a more important issue and will only continue to grow. 

When I joined the U.S. Secret Service in 1985, computers and the Internet were becoming a part of our everyday life but we had no way to educate the public and properly secure our information.

Read more...

Slow down - don't click on that link!

Written by

We teach our children to not talk to strangers as soon as they are able to communicate. 

But for some reason that same logic is thrown out the window when it comes to how we act on the Internet.

When you receive email from a name you recognize, this could be the biggest online risk you will face.

Hackers are now using various techniques to find a name you will recognize to trick you into opening links or attachments!

If I sent you an e-mail from a name you did not know that had a link:  

If you click on this link, your computer will be infected by a virus that will steal your identity!

I suspect that most of you would NOT click on the link!

Read more...

Social Media Security

Written by

Today’s Internet connected World makes creating and sharing information easier than ever. Connectivity no longer stops when leaving your home or office. It continues wherever you travel, and across networks. Wherever they are, millions of Americans participate daily in a growing “Internet of Things.”
 
Strong network and device controls provide reliable security. Human behavior is less easy to regulate. Yet more of us take part in risky online communication where security is an afterthought.

Read more...
Subscribe to this RSS feed

Log in