Cybersecurity Month Build A Better Password Banner
  
  
Description
  
  
  
Phish TankPhish Tank
A collection of phishing scams that have attempted to bait the Auburn community.
Phish TankIn page navigation
0
2-Factor AuthenticationDUO
Auburn has implemented DUO as high-security login authentication.
2-Factor Authentication (DUO)In page navigation
1
SpirionSpirion
Enables Auburn employees to comply with protecting restricted data.
SpirionIn page navigation
2
Cybsecurity Awareness TipsSecurity
Auburn Cybersecurity Awareness Month information
Cybersecurity Awareness TipsIn page navigation
3
Mobile Device SecurityMobile Device
Auburn University's mobile device security requirements.
Mobile Device SecurityIn page navigation
4
PhishingPhishing
Phishing is an attempt to acquire personal information masquerading as a trustworthy entity.
PhishingIn page navigation
5
SANS Securing the HumanSANS
Each day more and more cyber threats are committed against institutions of higher education.
SANS Securing the HumanIn page navigation
6
Spyware/MalwareSpyware
Removal Tips, Tools, and Information.
Spyware/MalwareIn page navigation
7
Virus ProtectionVirus Protection
Everyone at Auburn University is expected to take precautions to protect their computers against viruses.
Virus ProtectionIn page navigation
8
VPN ClientVPN Client
A VPN provides a secure two-way communication tunnel to the Auburn University network.
VPN ClientIn page navigation
9
Case In PointCase In Point
Lessons for the pro-active manager
Case In PointIn page navigation
12
Project CleanupDelete
Improving security and minimizing risk through proper data management
Project CleanupIn page navigation
13
LastPassLastPass Logo
Stores links to websites, auto-generates secure passwords and auto-fills password forms.
LassPass InformationIn page navigation
14
External ResourcesWeb Resources
External Cybersecurity resources
External ResourcesIn page navigation
15
  
  
Description
  
  
  
Minimum Server StandardsServers
Minimum standards for server administration and security.
Minimum Server StandardsIn page navigation
100
Minimum Endpoint StandardsLaptop
Minimum standards for endpoint administration and security.
Minimum Endpoint StandardsIn page navigation
101
Minimum App StandardsApplication Code
Minimum standards for application development and security.
Minimum App StandardsIn page navigation
102
Data Storage MatrixStorage Device
Standards for data storage by classifiction
Data Storage MatrixIn page navigation
103
  infosec@auburn.edu  or    844-0888 with questions
  
  
  
William Miaoulis

National Cybersecurity Awareness Month (NCSAM) began in 2004 through the Department of Homeland Security and the National Cyber Security Alliance with a goal of raising awareness about the importance of Cybersecurity. NCSAM 2019 will emphasize personal accountability and stress the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. This year's overarching message -- Own IT. Secure IT. Protect IT. -- will focus on key areas including citizen privacy, consumer devices, and e-commerce security.

  1. Own IT: It is important to be aware of your digital profile, and you do that by understanding the devices and applications you use every day. You have to know about something to protect it.
  2. Secure IT: Use all of the security tools available to you. This can include creating stronger, longer passwords and using Multi-Factor Authentication whenever possible. Use available security tools at work, on social media, and with your financial institutions. Protect yourself against phishing attacks by carefully reviewing emails and not clicking on unknown links or attachments.
  3. Protect IT: Everything you do on a computer creates a trail that can be used by cybercriminals. Make sure you keep your browsers and operating systems up to date. Be careful with public WiFi, and be familiar with and understand the privacy rules and settings within the applications you use. Do you really need that application on your phone or desktop?

For additional resources, you can visit the Department of Homeland Security's Cybersecurity Awareness Month PageStay Safe Online , or the Auburn University Cybersecurity Center.


Published: 10/16/2019 9:32 AM
Category:
# Comments: 0
  
William Miaoulis

Some helpful hints from SANS on Creating a Cyber Secure Home.  You can download the poster here:  SANS POSTER

I also recommend subscribing to the SANS monthly security awareness newsletter at Security Awareness Newsletter

SansSecuringtheHome-SMALL.jpg



Published: 9/27/2019 8:15 AM
Category: Ideas
# Comments: 0
  
William Miaoulis

Every day we read about another company being hacked, paying ransom ware, sextortion emails, job scams, credit card fraud, social security numbers hacked, identity theft and other ways individuals are committing cybercrime.    What can you do to protect yourself?  Here are a few tips.

  • Sign up for 2-Factor (2FA) Authentication – Whenever it's available, sign up for 2FA. Most financial institutions now offer it, as do most social media networks and major online retailers. Auburn requires DUO for connecting to most sensitive systems.
  • Change Your Passwords – If you use the same password across multiple accounts, you should change them. Make sure your new passwords are long  and complex(12 characters or greater, upper case letters, lower case letters, numbers, and special characters), unique, and not easy to guess.
  • Use LastPass – LastPass is a password vault that allows you to store all those unique passwords in a secure location, and it is free with an Auburn email account. Find out more at https://aub.ie\lastpass - just be sure you use a long password and two factor authentication because if this password gets hacked, you risk all your accounts being hacked.
  • Lock Your Credit File – Subscribe to a credit monitoring service, and lock your credit file when not in use. For more information on freezing (locking) your credit  https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs.
  • Check the Full Email Address – It's easy to set up a free account on Gmail, Hotmail, Yahoo, etc. that looks legitimate. Check the full email address to see if it's really from the sender. For example, OIT emails will come from oit@auburn.edu, not from auburnuniversityoit@gmail.com. If you see two "@" signs, it's fake.
  • Never Click Links – If you can't verify the sender, or if you aren't expecting the email, don't open attachments or click links. Call the sender and confirm before opening anything.
  • Keep Your Information Private - Do not give away your user name and password to anyone, for any reason.
  • Don't Buy Gift Cards or Wire Transfers – If you get an email from your boss that asks you to send a wire transfer or buy gift cards, DON'T DO IT. Verify the wire transfer verbally, and don't buy those gift cards.
  • Research Job Offers – If a job offer sounds too good to be true, it probably is. Do not send personal information to a potential employer unless you can verify the company information.
  • Don't Cash a Check to Pay Others – If someone gives you a $2,000 cashier's check and tells you to deposit it and instructs you to send $500 to three people and keep $500 for your troubles, you will probably lose $2,000.
  • Backup Your Data – Securely backup your data, your term papers, your research, anything that is important to you. If you can't risk losing the last 8 hours-worth of work, then create a backup.

 

For more information on Cybersecurity threats and practices, visit https://aub.ie/cybersecurity. And if you have any questions, or if you need assistance with any of these issues, contact Auburn's cybersecurity staff at infosec@auburn.edu


Published: 8/28/2019 2:02 PM
Category: Opinions
# Comments: 0
1 - 3Next
Retrieving Data
Retrieving Data