CIO Insight October 2020
CIO Insight October 2020

October 2020

12th Annual Cybersecurity Awareness Day

Kennesaw State University's Cybersecurity Awareness Day will kick off on Tuesday, October 6th, for a whole month of cybersecurity awareness activities, as October is National Cybersecurity Awareness Month.

This year, there is a national theme of #BeCyberSmart.  Throughout the month, we will explore best practices for keeping you safe online. 

Cybersecurity Awareness Day - Event 1
Date: Tuesday, October 6, 2020
Time: 9am-3pm
Location: Online - Zoom Meeting
Meeting ID: 816 3100 6551
Passcode: pTnc2Y

Cybersecurity Awareness Day - Event 2
Date: Wednesday, October 21, 2020
Time: 9am-3pm
Location: Online - Zoom Meeting
Meeting ID: 875 0548 9934
Passcode: x4TnkP

We have some great presenters and topics this year, as well as games and prizes. Be on the lookout for an article each week in KSU Today and Student Inform related to Cybersecurity. 

Weekly topics will include:

·        Social Engineering Awareness
·        Mobile Device Security
·        Securing Devices at Work & Home
·        Cyber Skills Trends

Keep an eye on our event site for more details.

Social Engineering

Social Engineering is a method of fraud used by attackers to acquire sensitive and valuable information from individuals by tricking or otherwise misleading them. While this is done in different ways, email and phone calls are by far the most common method, with some kinds of phishing emails using this tactic.
Communications are designed to put the recipient at ease by appearing to originate from a trustworthy source, such as impersonating a coworker or supervisor with a familiar username. Often, they will be urgent in their requests, which usually lead up to asking for confidential or financial data. Attackers commonly use this tactic to steal login credentials or other information needed for them to profit or otherwise benefit financially.
If you are unsure and suspect a possible attack using social engineering, check the full email address of the sender and not just the displayed name. If there is an unusual sense of urgency within an email from someone claiming to be your supervisor or co-worker, give them a call and speak with them directly. Attackers often exploit our natural instinct to help others to get us to give them the information they want.  Consider if the request is a normal and expected part of your job and if the request is appropriate for your role. Think about the reasonableness of the request in question- does it make sense for the person in question to ask this of you?

Everyone can help protect against such attacks by being alert and aware of this threat.

Potential Vulnerabilities and Steps to Secure Devices

  • Always keep your devices updated with the latest software. 
  • When you are traveling, do not leave any of your electronic devices in the hotel room, take them with you whenever you can.
  • When you are not using your device, lock the screen and if you are in a public place such as a hotel, put all devices out of sight should you need to leave the room momentarily.
  • Be aware of penetration technologies where bad actors can access your passwords over Wi-Fi. At a minimum, use devices that already come with some form of encryption such as Bluetooth and the latest AES. 
  • Whether it is your cell phone, tablet, laptop, or PC at home, be sure to make your passwords strong and uniquely different for every account you own.
  • Google recommends using a two-step verification system to safeguard your accounts.
  • When downloading apps to your devices, only download from a secure trusted source such as Google Play or Apple’s App Store.
  • Make sure that when you log into a Wi-Fi network that it is encrypted and protected with a strong password.
  • Avoid accessing sensitive data when you are on a public network that can be visible to others while surfing the web at the local coffee shop or bar. 

The Service Desk is Ready to Assist You

Kennesaw State University Service Desk is available to assist students, faculty, and staff with technology issues related to university-owned devices and university-supported software. 
Explore the new technology self-service portal here

Did you know...

  • Spending on Cybersecurity is predicted to reach over $133 billion by 2022, worldwide? [2
  • It is estimated that over $17,000 is lost every minute due to phishing attacks? [3]
  • Email is used to deliver 94% of malicious software (malware)?[4]
  • 95% of all data breaches are in the government, retail, and technology sectors? [5]
  • The average recovery cost from a ransomware attack is now more than $84,000? [6]

The Top Cybersecurity Trends for 2020

Each year, cyber attackers get more creative and attacks appear to move through different industries in waves. The truth is, criminals are developing these attacks at an increasing rate and those of us defending are in high demand, but not easy to find. The following is a brief list of trending attacks for 2020 [1]:
-Financial cyber-threats
-Mobile banking trojans, ransomware against banking infrastructure, and threats such as card info theft
-Healthcare: private patient information theft, IoT (Internet of Things) in medical devices are frequently vulnerable to attack
-Smart devices: consumer IoT devices such as Ring, cameras, and door locks
-Vehicles and transportation infrastructure: both connected and autonomous vehicles are being targeted
-Increase in Deepfake attacks: attackers perpetrating scams by faking voice messages using AI. 
Please join us on October 6 and 21 to learn more about these topics at our 12th annual Cybersecurity Awareness Day events!

Mobile Device Security

Security begins with awareness! Many of us make sure that our homes are safe and secure without much thought, as it has become second nature when checking if all is locked up and secure during our daily routines.  We need to be just as effective when it comes to protecting our mobile devices.  Not sure how to batten down the hatches on your mobile devices? We will be covering ways to better secure Android, IOS, and Laptops through device settings, anti-virus, best practices, and more.  Come join us for informative presentations during the Cybersecurity Awareness Month to pick up some valuable new habits.
Twitter Facebook Instagram
powered by emma
Subscribe to our email list.