Thursday, September 22, 2016

About Cyberwyze


Whether you admit it or not, cybercrime is the new battle frontier, from theft to terrorism, and everything in between—scam, espionage, sabotage, you name it, it is here and growing. As long we have this vast and expanding parallel universe called the Internet, as long as technology keeps evolving, for good and bad, cybercrime is here to stay. The question is---what will you do about it? Let me be the first to tell you, if you haven’t heard, ignorance is no bliss here, apathy is no option, retreat offers no reprieve, you can’t run or hide, you can’t leave your safety to your government; you must do your part. Equipping you to do just that is why am doing this; the sole reason for this blog.

The United States, in her quest for openness and freedom for all, gave the world the Internet, we will not let our enemies make that gift our Achilles heel. The enemy may be thousands of miles away, yet can strike in a split of a second, needs no army or fire power, just keystrokes to deal a devastating blow that can rob you of your life savings, steal your identity, sabotage our government, undermine our system of government, and cripple our society and destroy our way of life.

Our biggest weakness is negligence, our adversaries’ greatest weapon is our negligence. You can do your part wherever you are, all you have to do is take simple steps to protect your personal information, protect information entrusted to you by your employer, whether public or private. Those simple steps is what this blog is about and hopes to give you. So read on.

Wednesday, September 21, 2016

Are you Cyberwyze?

Growing up we were always taught to be streetwise, and most of us still are, but how about “cyberwyze”—are you “cyberwyze”?  My goal is to keep us safe from the ploys of the adversaries who are constantly looking for whom to defraud.  So you keep reading, and I’ll keep researching everywhere to get credible information to help you and I render unachievable the nefarious plots of the adversaries (hackers).

·         Here are some practical ways to help us be Cyberwyze (Courtesy of the Department of Homeland Security):
Never click on links in emails. If you do think the email is legitimate, whether from a third party retailer or primary retailer, go to the site and log on directly. Whatever notification or service offering was referenced in the email, if valid, will be available via regular log on. Never
open the attachments. Typically, retailers will not send emails with attachments. If there is any doubt, contact the retailer directly and ask whether the email with the attachment was sent from them.

Do not give out personal information over the phone or in an email unless completely sure. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide you their name and a call-back number. Just because they may have some of your information does not mean they are legitimate!

Set secure passwords and don't share them with anyone. Avoid using common words, phrases, or personal information and update regularly.

Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies.

Verify the authenticity of requests from companies or individuals by contacting them directly. If you are asked to provide personal information via email, you can independently contact the company directly to verify this request.

Pay close attention to website URLs. Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net) to deceive unsuspecting computer users.

For e-Mail, turn off the option to automatically download attachments.

Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.