Cyber Security Tips Newsletters
In collaboration with the Multi-State - Information Sharing and Analysis Center (MS- ISAC) PEMA provides monthly Cyber Security Tips Newsletters.
Our goal is to improve the overall cyber security posture of the City of Providence and our community partners. Collaboration and information sharing among members, private sector partners, local jurisdictions and the U.S. Department of Homeland Security are the keys to success.
PEMA Newsletters
August 2013: Java Exploits
What is Java? Java is a computer language that allows programmers and application developers to write software that can run on many different operating systems. Many applications and websites require end-users to have Java installed. Websites incorporate Java applets (small applications) to enhance the usability and functionality of a website. In general, when a user visits one of these websites, depending on their browser's security settings, they may have no idea that the Java applet is automatically running.
July 2013: Using Wi-Fi: Connect With Care
If you're traveling this summer, chances are you'll encounter a Wi-Fi hotspot (network) or two. Wi-Fi in airports, hotels, train stations, coffee shops, and other public places can be convenient, but they're often not secure, and can leave you at risk. Learn more about how to safeguard yourself.
June 2013: Keeping Senior Citizens Safe Online
Senior citizens are embracing the digital age in greater numbers every year. Fifty-three percent of adults ages 65 and older now use the Internet and online tools such as email, according to the Pew Internet & American Life Project. Among those Internet users, seventy percent report going online daily.
May 2013: Do You Know Where Your Personal Information Is?
As consumers of online services, we create information through our use of social media, online shopping, and many other activities. Public records are also a source of information about individuals, which can get posted online. It is important to be aware that once this data is online, that can be difficult to remove.
April 2013: Protect Yourself from Email Phishing Attacks
When using the email, it is difficult to know, with certainty, with whom you are communicating. Scammers will utilize this uncertainty to pose as legitimate businesses, organizations, or individuals, and gain the trust of users. If a scammer is able to gain the trust of victims, they can leverage this trust to convince victims to willingly give up information or click on malicious links or attachments.
March 2013: Protect Yourself from Email Tax Scams
It's tax season and criminals are seizing the opportunity for scams. Don't become the next victim. Scammers leverage every means at their disposal to separate you from your money, your identity, or anything else of value they can get. They may offer seemingly legitimate "tax services" designed to steal your identity and your tax refund, sometimes with the lure of bigger write-offs or refunds. Scams may include mocked up websites and tax forms that look like they belong to the IRS to trick you into providing your personal information.
February 2013: How Do I Protect the Information on My Smartphone
We've come to depend on our smartphones so heavily it is hard to remember what we did before we had them. If you have a smartphone, you now carry a fully functional computer in your pocket or purse. That's a tremendous amount of information at your fingertips! Therefore, it is paramount that you safeguard the smartphone.
January 2013: Emerging Trends and Threats for 2013
During 2012, cyber security incidents included theft of public and private intellectual property, hacktivism, ransomware, malware targeting mobile devices, and a surge of other malware, Black Hole Rootkit and Zero Access Trojan. What will we see in 2013? The newsletter has a brief round-up, listed in no particular order, of several threats and trends we can expect during the next 12 months.
PEMA Newsletters
December 2012: Cyber Crime and How it Affects You
Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime include identity theft, financial fraud, web site defacements and cyber bullying. At an organizational level, cyber crime may involve the hacking of customer databases and theft of intellectual property. Many users think they can protect themselves, their accounts, and their PCs with just anti-spyware and anti-virus software. Cyber criminals are becoming more sophisticated and they are targeting consumers as well as public and private organizations.
November 2012: Tips for Secure Shopping Online During the Holiday Season
Cyber Monday (the Monday after Thanksgiving) and online shopping throughout the entire holiday season have become increasingly popular in recent years, and the trend is expected to continue this season. According to MarketLive, an e-commerce software and solutions provider, online shoppers in the U.S. are projected to spend more than $54 billion this holiday season, nearly a 17 percent increase over the $47 billion spent last year.
October 2012: National Cyber Security Awareness Month - Tips for Staying Safe Online
October is National Cyber Security Awareness Month. This is an effort coordinated by the U.S. Department of Homeland Security, the Multi-State ISAC, and the National Cyber Security Alliance along with many governments, businesses, schools, and other groups to help improve cyber security preparedness. It's a great time to evaluate your online activities and take some basic steps to protect yourself.
September 2012: Using Encryption to Protect Data
According to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year. Protection of data requires multiple layers of defense, and the use of encryption to secure sensitive data is a critical tool in this multi-layered approach.
Wireless networks are not as secure as the traditional "wired" networks, but you can minimize the risk on your wireless network (at home or at work) by following these tips.
July 2012: Managing Your Digital Footprint - Think Before You Post
If you're not familiar with the phrase "digital footprint," it's important that you become aware of what it is and how it impacts you. Digital footprint refers to the compilation of content on the Internet that can be associated with you and, thus, potentially available by anyone performing a search on you.
June 2012: Social Engineering - You are at Risk
The term "social engineering" refers to an attempt to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals. Most users should be familiar with email phishing scams (a form of social engineering) and have been taught not to open attachments from unknown or untrusted sources or to visit untrusted web sites.
May 2012: Creating a Cyber-Secure Environment at Home
Most workplaces have cyber security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies.
April 2012: Creating a Secure Password
Your password is more than just a key to your computer or online account. It is a gateway to all of your important information. If your password falls into the wrong hands, a cyber criminal can impersonate you online, access your bank or credit card accounts, sign your name to online service agreements or contracts, engage in financial transactions, or change your account information.
March 2012: Mobile Apps and How To Use Them Safely
The use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. The continued growth of mobile apps requires a spotlight on security. The risks include access to information such as physical location or contacts lists, as well as the ability for the apps to download malware, such as keyloggers or programs that eavesdrop on phone calls and text messages.
February 2012: Securing Your Web Browser
Web browsers and related plug-ins are primary tools for interacting with the Internet, making them prime targets for cyber attacks. It is important to understand the risks and know what steps you can take to help minimize the likelihood of a successful attack.
January 2012: Cyber Security Emerging Trends and Threats for 2012
During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks was a key challenge for organizations of all sizes in both the public and private sectors.
PEMA Newsletters
December 2011: Tips for Staying Safe on Social Networking Sites
The popularity of social networking sites -- such as MySpace, Facebook, Twitter and others -- has expanded tremendously in recent years, with nearly two-thirds of Americans using these sites regularly. A recent study reported that 91% of respondents have received spam and 54% were targets of phishing attacks on social networking sites.
November 2011: Tips for Secure Shopping During the Holiday Season
As the holiday season draws near, an increasing number of people will be doing their shopping in cyber space. Last year, online shopping expenditures in the U.S. reached a record $32.6 billion for the November-December period - marking a 12% jump from 2009. With the increased volume of online shopping, it's important that consumers understand the potential security risks and know how to protect themselves and their information.
October 2011: Cyber Security and You - Top Ten Tips
October is "Cyber Security Awareness Month." The theme is "Cyber Security is our Shared Responsibility" and that message has never been more appropriate. While there are many steps that people can take to be safe online; attached is a list of ten things you can do to secure your information.
September 2011: Disaster Preparedness for Personal Information Assets
September is "Disaster Preparedness Month." It's important to consider how we safeguard our information in the event of a natural disaster, man-made event, or even a system failure. This newsletter will discuss some steps you can take to secure your critical information and some best practices to make information security part of daily life.
August 2011: Phishing Alerts - Fake Traffic Tickets & False Credit Union Messages
There have been a number of recent "phishing" campaigns, which are attempts by individuals or groups to solicit personal information from unsuspecting users by employing social engineering techniques. This month's newsletter will focus on some of recent campaigns and provide guidance for protecting yourself and your information.
July 2011: Cyber Crime: How It Happens And How You Can Protect Yourself
An increasing number of domestic and international criminals are using the Internet for illegal purposes. Computers and other electronic devices can be used to commit crimes. This newsletter will discuss who are potential targets, the nature of computer and cyber crime, and what you can do to be safe.
June 2011: Securing Mobile Devices: Big Things Come in Small Packages!
Mobile computing devices include mobile phones, IP phones, pagers, BlackBerry devices, iPhones, smart phones, and portable storage devices, such as USB drives. Some of these devices are multifunctional and may be used for voice calls, text messages, email, Internet access, and may allow access to computers and/or networks. Some also include Near Field Communication (NFC) capabilities, which allows the user to perform activities such as debit/credit card transactions or utilizing the device as a car and/or house key. Small and relatively inexpensive, these multifunction devices are becoming as powerful as desktop or laptop computers.
