Announcements:
1. Tomorrow will be our second refresher over Microsoft Teams at 9 AM.
2. Per our movement toward NIST compliance going forward no device,, should have resident information stored on it. When I conduct visits all computers, tablets and other COF-owned devices will be evaluated for compliance. If you have questions about this see me.
We’re now in the fourth week of our cybersecurity series. Over the past weeks, we’ve learned about password managers, how to install LastPass, the dangers of phishing and other socially engineered online scams, secure password creation and sharing, and other tools we use to protect ourselves.
Good Cyber security is like onions there are multiple layers of safeguards and walls in place. Each one serves a purpose. The first line of defense is always using best practices and internet common sense.
One note do not use the same password for everything even slight variations make it harder for malicious people.
This week, we’re focusing on what to do if you suspect you’ve been a victim of a cyber threat or your computer is infected.
Step 1: Identify the Issue If you notice any suspicious activity such as unfamiliar emails in your sent folder, unexpected password reset emails, or unauthorized transactions, you may have been targeted.
- Check Your Accounts: Regularly review your online accounts for unauthorized activity or changes. This includes email, social media, bank accounts, and any other services you use.
- Monitor Your Emails: Be aware of unexpected password reset emails, emails about changes to your account settings, or emails from unknown senders.
- Look for Performance Changes: If your device is running slower than usual, crashing, or displaying frequent error messages, it could be a sign of malware.
- Watch for Unusual Network Traffic: An unexpected increase in data usage could indicate that a malicious program is using your network.
- Be Aware of New or Changed Files: If you notice new files on your system that you didn’t download, or if existing files were modified without your knowledge, it could be a sign of a security breach.
- Check Your Browser: Unexpected changes in your browser, such as new toolbars, extensions, or a changed homepage, could indicate a problem.
- Use Security Tools: Use the security tools available in your operating system to scan for issues. City of Faith Utilizes a program called Trend Micro for our security. If your system does not have this or you don’t know how to use it please see IT
Step 2: Report the Incident Immediately report the incident to our IT department at City of Faith IT email Include as much detail as possible about what you’ve observed. Screen Shots are always helpful. It’s best practice to tell IT what you clicked on and when the problem started Occurring.
Step 3: Change Your Passwords If an issue is identified IT will recommend all your passwords be changed. Change your passwords for all your accounts, starting with your email and financial accounts. Remember to use LastPass to generate and store strong, unique passwords. See Here for more information.
Step 4: Monitor Your Accounts Keep a close eye on your accounts for any further suspicious activity. If you notice anything unusual, report it immediately.
Step 5: Be Cautious of Scam Attempts Be wary of any emails or messages asking for personal information. Always verify the source before clicking on any links or providing information. Do not install anything on your device without first getting IT department approval. All programs must be evaluated for security compliance.
Step 6: Educate yourself on Malware Malware, short for malicious software, is any software intentionally designed to cause damage to a computer, server, client, or computer network. It’s a broad term that encompasses various harmful types of software, including viruses, ransomware, spyware, and trojans. Malware can steal, delete, or encrypt your data, alter or hijack core computing functions, and spy on your computer activity without your knowledge or permission. It often spreads via email attachments, software downloads from the internet, or operating system vulnerabilities. It’s important to use antivirus software and follow good security practices to protect against malware.
70% OF ALL MALWARE GOES UNDETECTED BY ALL ANTIVIRUS SOFTWARE BECAUSE USERS ALLOW IT IN
There are several common types of malware that you should be aware of:
1. Ransomware: This type of malware disables the victim’s access to data until a ransom is paid.
2. Fileless Malware: This malware makes changes to files that are native to the operating system.
3. Spyware: This collects user activity data without their knowledge.
4. Adware: This serves unwanted advertisements.
5. Trojans: This disguises itself as desirable code.
6. Worms: This spreads through a network by replicating itself.
7. Rootkits: This gives hackers remote control of a victim’s device.
8. Keyloggers: This monitors users’ keystrokes.
9. Bots: This launches a broad flood of attacks.
10. Mobile Malware: This infects mobile devices.
11. Wiper Malware: This erases user data beyond recoverability.
Each type of malware has its own characteristics and methods of operation. It’s important to have a good understanding of these types in order to protect your computer effectively. Let me know if you need more information on any of these types.
Physical Security
Physical Security should be monitored as well. Here are some tips for maintaining a safe and secure work environment:
- You should not leave your computer open with sensitive information at any given time.
2. Do not write your passwords on sticky notes and out in the open.
a. The best way to secure your passwords is by using last pass and MFA. One of the changes coming to City of Faith in the near future is to add MFA to all City of Faith Utilized Software.
Recent studies have actually indicated the most secure form of password protection is called Passwordless Passwordless security is a type of authentication that doesn’t use passwords or any other secret you need to remember to verify who you are. Instead, it uses something you have, like a device or a hardware token, or something you are, like a fingerprint or face scan. The main advantage of passwordless security is that it gets rid of the risks that come with using passwords. These risks include having your password stolen, using the same password for multiple accounts, and the constant need to manage and remember passwords. Passwordless authentication also makes signing in easier and quicker, which can make people more productive. It also increases security by getting rid of password-related risks. When setting up passwordless security, it’s important to choose methods that make sense for the people using them and the devices and networks they’re using. It’s also a good idea to use multi-factor authentication, which means you need to provide two or more forms of authentication before you can access an account. In summary, passwordless security is considered a best practice because it makes things more secure, easier for users, and reduces the need for managing passwords. However, like all security measures, it should be used as part of a wider security strategy that includes other protections like firewalls, antivirus software, and secure network protocols.
3. Devices when not in use should be kept behind locked doors(don’t leave your office unlocked)
4. Inspect your system for external devices not placed by you regularly. As a general rule we should not have unauthorized devices plugged into our computers you don’t want to be responsible for accidentally uploading a virus to COF.
5. Only use City of Faith Authorized equipment. Don’t use a home device without prior authorization and written approval.
Remember, your security is our top priority. If you have any questions or concerns, please don’t hesitate to reach out to our IT department.
Our next Series will be targeted toward the New Forms Bureau and the Different things available to everyone there. As always if you are having issues please submit a ticket. This article can always be reviewed on the Help Desk Knowledge Base and Cofess.