An aware and educated Selkirk College community is critical in helping our post-secondary institution manage and protect our data. Computers, smartphones and tablets can all be at risk from cyber attacks.
Security is a starting point.
The top 3 guidelines:
Official emails will only be sent from email@example.com
IT will never ask you for your password
If you suspect suspicious emails, report to IT Services immediately OR "When In Doubt, Throw It Out"
A quick fact guideline of red flags to watch out for in your inbox. Click here....
Need Antivirus Protection?
Sophos Home Free Antivirus Protection. Features include:
Predictive Artificial Intelligence (AI) Threat Detection
Real time Antivirus
Parental Website Filtering
Protects up to 3 devices including Windows PC and MacOS
Windows system requirements: Windows 7, Windows 8/8.1 or Windows 10, minimum 1GB of free disk space, minimum 1GB of RAM
Get your FREE copy.
Web Browsing Dos and Don'ts
Very Definite Don’ts
Don’t click on a link you weren’t expecting
Don’t work, shop or bank on public WiFi
Don’t post sensitive or personal information
Don’t use only one password
Very Definite Dos
Use common sense
Think before you click
Choose strong passwords
Become your own human firewall
Internet Security and You
Understanding the threat landscape is the first step in you becoming part of your organizations human firewall.
Social Engineering: the art of manipulating, influencing, or deceiving you in order to get you to take some action that isn’t in your own best interest or the best interest of the organization. For example, plugging in an infected USB device into your computer. The hacker may use the phone, email, postal service or direct contact to you to trick you. Phishing and Spear phishing are forms of social engineering.
File Types: You should know that not all file types are equal or safe. The only safe file type is .txt
Malware: “malicious software” An umbrella term for all the software out there that is being used by cybercriminals to spy on you and steal your information.
Websites: Any website is potentially dangerous. Gambling or porn sites or sites that offer free downloads can be infected with malicious advertising and you don’t even have to click on the site to be compromised.
Spear Phishing: a small, focused attack via email on a particular person or organization.
Phishing: Disguised emails from your bank, realtor, or even police station. Once you click on a link to open the email or attachment to get a closer look, you’ve been infected with malware.
Smartphones: Cybercriminals are trying hard to infect your smartphone. They use text links, tweets or websites that are optimized for mobile phones to make you think the link is from someone you know. All your confidential data, including your identity can be compromised.
Facts about Ransomware
Ransomware is malicious software that locks or encrypts your organization’s computer files or your mobile device. Typically, ransoms demand a fee to unlock the infected computers and have a deadline of 1 week.
Fact: Ransomware is one of the most profitable criminal business models in the history of malicious computer software, often referred to as “malware”.
Fact: Last year saw over 40,000 attacks per day with ransomware hiding in over 40% of email spam.
Fact: 91% of cyberattacks start with phishing emails.