SANS Tip-of-the-Day

Subscribe to SANS Tip-of-the-Day feed SANS Tip-of-the-Day
Security Awareness Tip of The Day
Updated: 1 hour 54 min ago

Major News Events

Mon, 08/03/2015 - 21:43
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.

Email Auto-Complete

Mon, 08/03/2015 - 02:06
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.

Two Home Computers

Thu, 07/30/2015 - 22:44
If possible, have two computers at home -- one for parents and one for kids. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.

Trust Your Instincts

Wed, 07/29/2015 - 21:59
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

Mobile Apps

Mon, 07/27/2015 - 22:11
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Lock Your Mobile Devices

Sun, 07/26/2015 - 21:46
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Protecting Your Social Media Account

Fri, 07/24/2015 - 14:52
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

Fri, 07/24/2015 - 14:52
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

Fri, 07/24/2015 - 14:52
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Protecting Your Social Media Account

Tue, 07/21/2015 - 21:35
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

Mon, 07/20/2015 - 22:44
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

Sun, 07/19/2015 - 23:27
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Use Caution Opening Email Attachments

Wed, 07/15/2015 - 22:47
A common method cyber criminals use to hack into people�s computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Securely Deleting Files

Tue, 07/14/2015 - 22:01
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Plugins

Sun, 07/12/2015 - 23:38
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Email and Emotions

Tue, 07/07/2015 - 22:04
Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.

You Are a Target

Sun, 07/05/2015 - 22:48
You may not realize it, but you are a target. Your computer, your work and personal accounts and your information are all highly valuable to cyber criminals. Be mindful that bad guys are out to get you.

Anti-Virus

Thu, 07/02/2015 - 23:59
Make sure you have anti-virus software installed on your computer and that it is automatically updating. However, keep in mind that no anti-virus can catch all malware; your computer can still be infected. That is why it's so important you use common sense and be wary of any messages that seem odd or suspicious.

Browse With Encryption

Wed, 07/01/2015 - 22:59
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Kids and Family Members

Tue, 06/30/2015 - 23:31
If you have children visiting or staying with family members (such as grandparents), make sure the family members know your rules concerning technology that your kids must follow. Just because your kids leave the house does not mean the rules about what they can do online change.

Pages