 |
|
As the Ides of March approaches...
... people are reminded to watch their backs. After all, had Julius Caesar done as much in 44 B.C., he may have experienced a much different end.
Read on to learn how you can identify potential trouble spots in your increasingly digital life -- long before they come to call.
IN THIS ISSUE
|
|
Are You Privacy Savvy? Are Your Employees?
|
|
Take this 5-minute quiz to find out.
We are so excited to bring you
this short quiz for both personal and business use. In no time flat, the quiz tells individuals just how well they are protecting their personal privacy in three key areas:
- Password use, including how they are created and how often they are changed
- Daily activities, such as plastic card payments and social media practices
- Data protection, like document disposal, file backups and the use of encryption
Besides being a fun and awareness-raising activity for individuals, the quiz also supports the legal requirements most organizations have for providing employee privacy and security education. You can achieve that
through ongoing awareness communications, reminders and activities...like this quiz!
After you take the quiz, please let me know your feedback. If you get an idea for other privacy or information security topics for me to make further quizzes about, certainly let me know. I love to hear your suggestions about what you would find interesting. And, I may make another quiz with your suggested topic!
|
|
Your Medical Records are Under Siege
|
|
Each record sells for $50 on the dark web.
Attackers are becoming even more bold in their healthcare industry cyber schemes. By infecting medical devices and systems, they create a back door in the networks that house your most private health data. This could very well
impact your health and safety if someone modified that data
.
As a recent example,
one San Mateo, Calif. security team found malware on several types of medical devices including an x-ray printer, an oncology unit's MRI scanner, a surgical center's blood gas analyzer and a health care provider's PACS-picture archiving and communication system.
The team's CEO
told a local ABC affiliate, "Those devices are in the operating room; they could be in a hospital bed. Lives could be dependent on them and if they're disrupted with malware or ransomware or other attacker toolkits-they may not be able to do what they're meant to do."
Download and share this infographic
with your doctors, nurses, data security pros and privacy pros,
to raise awareness of the need for greater privacy and security protection in hospital and clinics!
|
|
When a Website Looks Like Gibberish
|
|
It's a trick. Don't click on any pop ups.
A new delivery channel for a different type of ransomware has cropped up recently and is going after Chrome browser users.
According to BleepingComputer.com, this is how it works:
The criminals first hack legitimate web sites and add code that causes the site to look like gibberish. It then displays a pop-up that says the user needs a "Chrome Font Pack" to see the page properly.
I can see a lot of people falling for this one. Share this warning far and wide to prevent more ransomware victims!
(And be sure to make frequent backups. Keep them disconnected from your computer, just in case you get hit with ransomware.)
Another growing threat...
Public charging ports are another sneaky channel fraudsters are using to load malware and ransomware on your device,
delivered via a "juice jacking" path
. (
Thanks to my friend Jolynn D. for this find.)
If you must use one of these public ports, make sure you're protected with a device like the
Juice Jack Defender, created by my
friend Stuart at Charge Defense.
The clever gadget protects your devices from malware delivered via juice jacking. Many government agencies use it to protect their workers while they are traveling.
|
|
How Do You Spot Fake News?
|
|
Here are a few things you can try.
If a news story you're reading sounds particularly outlandish, it very well may be completely made up. With the rise of so many sites and apps claiming to be "news" organizations, it's increasingly easy to put false reporting out into the world, then sit back and watch it spread.
Here are a couple of quick tips for spotting whether or not a news article, quote or photo is legitimate.
- Check with Snopes.com and FactCheck.org.
- Copy and paste the URL of an image into Google Images to find the true source.
- Understand the context of the site; fake news might actually be satire.
A UK organization put together a pretty good video pointing out some ways to spot fake news by using Google to search by source, by quote or even by photo.
|
|
Surveillance taking place in all kinds of wacky ways
Are Autonomous Robots the Future of Mall Security?
Although harder to miss than a covert drone outside your window, this robotic security guard is just as effective at surveillance. It
can read 300 license plates a minute and run the results against a database.
|
|
| | | | |