2017 Orleans County Cyber Security Training

1. Don’t be tricked into giving away confidential information

  • Don’t respond to emails or phone calls requesting confidential company information
  • Always keep in mind that bad guys are successful because they are convincing. 
  • Recent news stories out of Canada reported scammers were tricking people into giving away information with fake tech support calls claiming to help. 

 

 

2. Don’t use an unprotected computer

  • When you access sensitive information from a non-secure computer you put the information you’re viewing at risk.
  • Malicious software exists that allows people to easily snoop on what you’re doing online when accessing unprotected sites. 
  • If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data.

 

 

3. Don’t leave sensitive info lying around the office

  • Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents.
  • Keep your desk tidy and documents locked away or shredded when no longer needed. 
  • It makes the office look more organized, and reduces the risk of information leaks.

 

 

4. Lock your computer and mobile phone when not in use

  • Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure.
  • Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes.

 

 

5. Stay alert and report suspicious activity

  • Sometimes suspicious activity isn’t as obvious as we think. 
  • A recent news story reported that a supermarket manager, who was randomly befriended by a mysterious woman on Facebook, ended up on a “date” with two men who overpowered him and robbed his store.
  • Be cautious of people you don't know asking for things, especially online.
  • Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it.

 

 

6. Password-protect sensitive files and devices

  • Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. 
  • Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data.

 

 

7. Always use hard-to-guess passwords

  • Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.”
  • Create complex passwords by including different letter cases, numbers, and even punctuation.
  • Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised.

 

 

8. Be cautious of suspicious emails and links

  • Hackers try to steal email lists from companies, which happened recently to Toshiba. Company email addresses are valuable to attackers, allowing them to create fake emails from "real people.“
  • Always delete suspicious emails from people you don't know. And never click on the links. 
  • Opening these emails or clicking on links in them can compromise your computer without you ever knowing it.

 

 

9. Don’t plug in personal devices without the OK from IT

  • Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. 
  • Even a brand new iPod or USB flash drive could be infected with a nasty virus. 
  • These devices can be compromised with code waiting to launch as soon as you plug them into a computer. 
  • Talk to IT about your devices and let them make the call.

 

 

10. Don’t install unauthorized programs on your work computer

  • Malicious applications often pose as legitimate programs like games, tools or even antivirus software.
  • They aim to fool you into infecting your computer or network.
  • If you like an application and think it will be useful, contact us and we’ll look into it for you