{"id":131235,"date":"2020-09-30T21:04:39","date_gmt":"2020-10-01T01:04:39","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=131235"},"modified":"2023-03-28T14:39:28","modified_gmt":"2023-03-28T18:39:28","slug":"ncsam-2019","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/archives\/ncsam-2019\/","title":{"rendered":"NCSAM 2019"},"content":{"rendered":"<h2><img loading=\"lazy\" src=\"\/tech\/files\/2019\/09\/dhs_ncsam2019_logob-636x224.png\" alt=\"2019 National Cybersecurity Awareness Month Banner\" width=\"636\" height=\"224\" class=\"aligncenter wp-image-123284 size-medium\" srcset=\"https:\/\/www.bu.edu\/tech\/files\/2019\/09\/dhs_ncsam2019_logob-636x224.png 636w, https:\/\/www.bu.edu\/tech\/files\/2019\/09\/dhs_ncsam2019_logob-768x271.png 768w, https:\/\/www.bu.edu\/tech\/files\/2019\/09\/dhs_ncsam2019_logob-1024x361.png 1024w, https:\/\/www.bu.edu\/tech\/files\/2019\/09\/dhs_ncsam2019_logob.png 1559w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><\/h2>\n<p><strong><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Week 4: October 22, 2019<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>Week 4: October 22, 2019<\/strong><\/h2>\n<h1 style=\"text-align: center;\">Cybersecurity While Traveling<\/h1>\n<p>Traveling is a must, as is staying connected. Pairing the two together puts us at a greater risk for cyberattacks. When you\u2019re traveling &#8211; whether domestic or international &#8211; it is always important to prepare and keep\u00a0cybersecurity\u00a0on your to-do list along with packing. Which leads us to our&#8230;<\/p>\n<p><strong>TIP OF THE WEEK:<\/strong>\u00a0Take\u00a0cybersecurity\u00a0on your trip (just like socks &amp; underwear)<\/p>\n<p><strong><em>Before You Go<\/em><\/strong><\/p>\n<ul>\n<li><strong>Find my phone:<\/strong>\u00a0Set up the \u201cfind my phone\u201d feature on your devices. This will allow you to find, remotely wipe data and\/or disable the device if it gets lost or into the wrong hands.<\/li>\n<li><strong>Back up your information:<\/strong>\u00a0Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.<\/li>\n<li><strong>Be up to date:<\/strong>\u00a0Update your software to the latest version available, turn on automatic updates so you don\u2019t have to think about it and set your security software to run regular scans.<\/li>\n<li><strong>Keep it locked:<\/strong>\u00a0Set your device to automatically lock after a short time when you are not using it.<\/li>\n<li><strong>Double your login protection:<\/strong>\u00a0Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any service that offers it as an option like, for faculty and staff, BU Office 365 email, SharePoint and other applications. Faculty &amp; staff, you can\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/duo\/office365\/\">opt-in now<\/a>!<\/li>\n<\/ul>\n<p><strong><em>During your trip<\/em><\/strong><\/p>\n<ul>\n<li><strong>Stay protected\u00a0while\u00a0connected:<\/strong>\u00a0Before you connect to any public wireless hotspot &#8211; such as at an airport, hotel, or caf\u00e9 &#8211; be sure to confirm the name of the network and exact login information to ensure that the network is legitimate. When you\u2019re using a public access point, avoid activities that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi .<\/li>\n<li><strong>Stop auto connecting:<\/strong>\u00a0Disable automatically connecting to available Wi-Fi or Bluetooth devices. This instant connection opens the door for cyber criminals to remotely access your devices.<\/li>\n<li><strong>Never click and tell:<\/strong>\u00a0Limit what information you post on social media &#8211; especially when and where you will be when you\u2019re away from home. Check in and post those amazing travel shots when you arrive back home.<\/li>\n<li><strong>Guard your mobile devices:<\/strong>\u00a0Be mindful of physical security &amp; keep your devices secured in taxis, at airports, on airplanes, and locked in your hotel room<\/li>\n<\/ul>\n<p>We want you to enjoy\u00a0traveling\u00a0whether it\u2019s for business or fun. Taking security precautions before and during a trip can prevent a major disruption like identity theft or access to your important information. For more info, check out our\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/security-tips\/\">Simple Security Tips<\/a>\u00a0on travel and\u00a0<strong>#BeCyberSmart<\/strong>.<\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Week 3: October 15, 2019<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>Week 3: October 15, 2019<\/strong><\/h2>\n<h1 style=\"text-align: center;\">SECURING YOUR MOBILE DEVICES<\/h1>\n<p>Laptops, smartphones and tablets &#8211; rarely do we leave home without them. They are our navigation, online shopping, banking, working, gaming, texting, tweeting, Facebook-checking machines. We use them to do just about everything including taking the all important selfie! But whether it\u2019s a hacked browser, unsecured Wi-Fi at the local coffee shop, or your own tendency to lose electronics (hey, it happens to the best of us), using your\u00a0mobile\u00a0devices\u00a0as a centralized source for all of your information comes with big risks. And the more you\u2019ve connected and stored, the more you stand to lose. Which leads us to our\u2026<\/p>\n<p><strong>TIP OF THE WEEK:<\/strong>\u00a0<em>Keep a Clean\u00a0<\/em><em>Mobile<\/em><em>\u00a0Machine<\/em><\/p>\n<p>Your\u00a0mobile\u00a0devices\u00a0need to be protected. The following security precautions will help you enjoy the conveniences of technology with peace of mind while you are on the go:<\/p>\n<ul>\n<li><strong>Lock your\u00a0<\/strong><strong>devices<\/strong>: Seems obvious, but many people don\u2019t lock their phone because it\u2019s inconvenient. Always use a passphrase, passcode or other features such as touch or facial recognition to lock your\u00a0devices.\u00a0Securing\u00a0your device can help protect your information if your device is lost or stolen and keep prying eyes out.<\/li>\n<li><strong>Be Wary of Wi-Fi hotspots<\/strong>: Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on public Wi-Fi, and avoid logging in to key accounts like email, banking, and work accounts. Consider using a virtual private network (VPN)\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/remote\/vpn\/\">like the one offered here at BU<\/a>, or a personal\/mobile\u00a0hotspot. Follow our\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/remote\/vpn\/use\/\">instructions<\/a>\u00a0for installing and using a VPN on your device.<\/li>\n<li><strong>Install an antivirus application<\/strong>: With your BU account you can download\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/software\/security\/macafee\/\">McAfee VirusScan<\/a>\u00a0software for FREE! Take advantage (<em>immediately!<\/em>).<\/li>\n<li><strong>Turn on encryption<\/strong>: If setting a passcode does not automatically encrypt your device, make sure to enable the native encryption (encryption comes standard with most phones).<\/li>\n<li><strong>Keep your system and applications up to date<\/strong>: Check to see that your device and applications are up to date, then set them to update automatically. This is the quickest way for the developer to provide you with the most up-to-date protection and can patch security holes that leave you vulnerable.<\/li>\n<li><strong>Delete when done<\/strong>: Many of us download apps for specific purposes, such as planning vacations, and no longer need them afterwards, or we may have previously downloaded apps that are longer useful or interesting to us. It\u2019s a good security practice to delete all apps you no longer use.<\/li>\n<li><strong>Enable Find my\u00a0<\/strong><strong>Devices<\/strong>: Consider enabling services that allow you to locate your phone if it is lost, send a message to it, or even wipe its contents remotely if you need to.<\/li>\n<\/ul>\n<p>Your\u00a0mobile\u00a0devices\u00a0will thank you for keeping them and yourself secure. For more tips on proactively\u00a0securing\u00a0your\u00a0mobile\u00a0devices, visit\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/security-tips\/\">Simple Security Tips<\/a>\u00a0on our website and\u00a0<strong>#BeCyberSmart<\/strong>!<\/p>\n<p>Have a safe and secure week, wherever you go!<\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Week 2: October 8, 2019<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>Week 2: October 8, 2019<\/strong><\/h2>\n<h1 style=\"text-align: center;\">PHISHING<\/h1>\n<p><em>\u201cNinety percent of cyber threats start with email, making it the #1 threat vector. Phishing attacks paired with impersonation techniques have made these email threats more sophisticated and harder to detect.\u201d<\/em><\/p>\n<p>\u2014 \u201cFighting Phishing &#8211; 2020 Foresight.\u201d Gartner, 2019<\/p>\n<p>Email is a daily necessity in our lives, and when we click on a link or download an attachment\u00a0<em>WE<\/em>\u00a0become our biggest security risk despite increasingly secure technology safeguards. Think of all the information you have online and then multiply it by the over 52,000 members of the BU community. That\u2019s a whole lot of data we need to protect and we haven\u2019t even covered labs, research, and grant data (<em>YIKES!<\/em>). We have a huge responsibility as part of the BU community, which leads us to our tip of the week\u2026<\/p>\n<p><strong>TIP OF THE WEEK:<\/strong>\u00a0<em>Don\u2019t take the bait!<\/em><\/p>\n<p>There\u00a0<em>is<\/em>\u00a0good news: being proactive and looking for the warning signs can and will protect you. Be wary of emails and be sure to stop and think before you take any action. Look for these clues you may have received a phish:<\/p>\n<ul>\n<li><strong>Sense of Urgency<\/strong>: \u201c<em>Immediate action required<\/em>\u201d or \u201c<em>Click now before your account is disabled<\/em>!\u201d<\/li>\n<li><strong>Requests for Information<\/strong>: The email requests highly sensitive information, such as your password, credit card number or social security number.<\/li>\n<li><strong>Be wary of Hyperlinks &amp; Attachments<\/strong>: Verify the link goes where it says it\u2019s going, hover over links to display the web address or hold your finger on a link from your mobile phone. Stop before your download anything and verify it\u2019s valid.<\/li>\n<li><strong>Verify the Sender<\/strong>: Sent from an official organization but uses a personal email address like @gmail.com, @yahoo.com or @hotmail.com.<\/li>\n<li><strong>Grammatical Errors<\/strong>: A reputable source uses spell check!<\/li>\n<li><strong>Timing<\/strong>: Were you even expecting this email?<\/li>\n<\/ul>\n<p><strong>#BeCyberSmart<\/strong>\u00a0and take a moment this week to read up on\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/security-tips\/\">phishing and simple tips<\/a>\u00a0to protect yourself and the University.<\/p>\n<p>In the unlikely event you\u00a0<em>do<\/em>\u00a0respond to a phishing email, the most important thing to do is\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/iam\/authentication\/kerberos\/kerberos\/\">change your password<\/a>\u00a0<strong>immediately<\/strong>\u00a0and contact the\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/contact\/\">IT Help Center<\/a>.<\/p>\n<p>Don&#8217;t forget! Our\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/events\/\">Fall Shred Event<\/a>\u00a0is happening today at the\u00a0<a href=\"https:\/\/maps.bu.edu\/?id=647#!m\/290609\">Kenmore Lot<\/a>, 549 Comm Ave. from 10:00am-1:00pm, look for the truck! Tomorrow (10\/9) we will be at the\u00a0<a href=\"https:\/\/maps.bu.edu\/?id=647#!m\/290587\">Agganis Lot<\/a>\u00a0and Thursday (10\/10) we will be shredding at BUMC in front of the\u00a0<a href=\"https:\/\/maps.bu.edu\/?id=647#!m\/400426\">Talbot Building<\/a>!<\/p>\n<p>Have a\u00a0<em>phish-free<\/em>\u00a0week!<\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Week 1: October 1, 2019<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>Week 1: October 1, 2019<\/strong><\/h2>\n<h1 style=\"text-align: center;\">PASSWORDS<\/h1>\n<p>Happy October! Today kicks off <a href=\"https:\/\/staysafeonline.org\/stay-safe-online\/\">National Cybersecurity Awareness Month (NCSAM)<\/a>, a collaborative effort between the U.S. Department of Homeland Security and the cybersecurity industry to raise awareness about the importance of protecting your information online. This year\u2019s NCSAM message is \u201cOwn IT. Secure IT. Protect IT.\u201d and will focus on personal accountability and stress the importance of taking proactive steps to enhance your online security at home and in the workplace.<\/p>\n<p>Every year, in alignment with NCSAM, the Information Security Team dedicates time to communicate resources and best practices in an effort to help our BU community become safer online. Each week this month we will be reaching out with simple tips and information on ways you can protect yourself and the University. Your information is important, and we want to help you keep it secure, so remember:<\/p>\n<p style=\"text-align: center;\"><strong><em>Own IT. Secure IT. Protect IT.<\/em><\/strong><\/p>\n<p>In addition, next week we will host our annual <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/events\/\">Fall Shred Events<\/a> in partnership with <em>sustainability<\/em>@BU. This is an amazing and FREE opportunity to shred any and all paperwork, especially documents containing personal, sensitive, or confidential information. We will also be collecting hard drives for destruction. Don\u2019t leave your data out there, SHRED IT! <a href=\"https:\/\/www.bu.edu\/sustainability\/\"><em>Sustainability<\/em>@BU<\/a> will be on site recycling all electronics, cords, batteries, lightbulbs, and toner. Check out the <a href=\"http:\/\/bu.edu\/infosec\">Information Security website<\/a> and the <a href=\"https:\/\/www.bu.edu\/calendar\/?day=2019-10-8\">BU Calendar<\/a> for times and dates!<\/p>\n<p><strong>TIP OF THE WEEK:<\/strong> Treat your passwords like your toothbrush: choose a good one, don\u2019t share it with anyone and get a new one regularly!<\/p>\n<p>Passwords are the cyber keys to your online home and work place. There is so much data stored online, including financial &amp; personal, and passwords allow access to ALL of that. Here are some simple tips to strengthening your passwords:<\/p>\n<ul>\n<li><strong>Use a passphrase:<\/strong> A passphrase consists of sequence of words with upper &amp; lower case, numbers and punctuation mixed in, for example: &#8220;IloveSt0rrowDr!&#8221; (Now you can&#8217;t use that!)<\/li>\n<li><strong>Don&#8217;t make passwords easy to guess<\/strong>: We ALL know your birthday and pet&#8217;s name from Instagram!<\/li>\n<li><strong>Keep your passwords to yourself:<\/strong> Always remember BU will NEVER ask for your password. Sharing is not caring in this case!<\/li>\n<li><strong>Unique account, unique password:<\/strong> Your most important accounts such as Email, Banking, and Kerberos should all have their own passwords, different from each other and not used for any other accounts.<\/li>\n<li><strong>Double your login protection:<\/strong> Use multi-factor authentication whenever and wherever it is an option.<\/li>\n<\/ul>\n<p>For more simple tips for living your best password life, check out <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/security-tips\/\">Creating a Password<\/a> on our website. Extra brownie points for sharing this page and our tips in your office, classroom or dorm! Spread the word and <strong>#BeCyberSmart!<\/strong><\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4352,"featured_media":0,"parent":110387,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/131235"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=131235"}],"version-history":[{"count":3,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/131235\/revisions"}],"predecessor-version":[{"id":144484,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/131235\/revisions\/144484"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/110387"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=131235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}