SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
InfraGard Albany Member Alliance
Monthly Security Tips
NEWSLETTER
July 2013 Volume 8, Issue 7
Using Wi-Fi: Connect With Care
If you’re traveling this summer, chances are you’ll encounter a Wi-Fi hotspot (network) or two.
Wi-Fi in airports, hotels, train stations, coffee shops, and other public places can be convenient, but they’re often
not secure, and can leave you at risk.
Whether you’re entertaining the kids by streaming a video on a tablet, downloading new travel apps on your
smartphone or even taking your tablet poolside, there are precautions you should take to make sure your personal
information is safe.
First and foremost, connect with care. If you're online through an unsecured network, you should be aware that
individuals with malicious intent may have established a Wi-Fi network with the intent to eavesdrop on your
connection. This could allow them to steal your credentials, financial information, or other sensitive and personal
information. It’s also possible that they could infect your system with malware. Any free Wi-Fi should be considered
to be “unsecure.” Therefore, be cautious about the sites you visit and the information you release.
STOP. THINK. CONNECT.
Here are 6 tips to remember when using Wi-Fi:
• Keep an updated machine. Having the latest security software, operating system, web browser and apps
can help protect you from the malware and other threats you may encounter when using Wi-Fi.
• Don’t assume that the Wi-Fi connection is secure. Many hotspots don’t encrypt the information you send
on the Wi-Fi network.
• Do not log into accounts, especially financial accounts, when using public wireless networks.
• Do not log onto sites that don’t seem legitimate, (clues could include the URL being misspelled, or not
matching the name that you were given by the place of business). It’s not uncommon for cybercriminals to
set up a Wi-Fi network called “free Wi-Fi” in airports, hotels, and other public places.
• A cellular 3G/4G connection is generally safer than a Wi-Fi connection.
• Consider turning off features on your computer or mobile devices that allow you to automatically connect
to Wi-Fi.
For More Information:
For additional information, please visit:
• OnGuardOnline.gov: Tips for Using Public Wi-Fi Networks
• US CERT: Cyber Threats to Mobile Phones
• US CERT: Holiday Traveling with Personal Internet-Enabled Devices
• Microsoft Security: Four Safety Tips for Using Public Wi-Fi
• Sophos: Hot Tips for Securing Your Wi
The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help
them behave in a more secure manner within their work environment.
awareness is intended to help improve the organization’s overall cyber security posture.
from their home computer. Organizations have permission and are encouraged to brand and
commercial purposes.
Sophos: Hot Tips for Securing Your Wi-Fi Network
hly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help
them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, th
awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network
Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non
Brought to you by:
hly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help
While some of the tips may relate to maintaining a home computer, the increased
This is especially critical if employees access their work network
redistribute this newsletter in whole for educational, non-

Mais conteúdo relacionado

Mais procurados

Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 

Mais procurados (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Cyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraCyber attacks during COVID-19 Era
Cyber attacks during COVID-19 Era
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 

Semelhante a InfraGard Albany Member Alliance Monthly Security Tips

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Semelhante a InfraGard Albany Member Alliance Monthly Security Tips (20)

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Wireless security
Wireless securityWireless security
Wireless security
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 

Mais de Liberteks

Mais de Liberteks (20)

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 

InfraGard Albany Member Alliance Monthly Security Tips

  • 1. InfraGard Albany Member Alliance Monthly Security Tips NEWSLETTER July 2013 Volume 8, Issue 7 Using Wi-Fi: Connect With Care If you’re traveling this summer, chances are you’ll encounter a Wi-Fi hotspot (network) or two. Wi-Fi in airports, hotels, train stations, coffee shops, and other public places can be convenient, but they’re often not secure, and can leave you at risk. Whether you’re entertaining the kids by streaming a video on a tablet, downloading new travel apps on your smartphone or even taking your tablet poolside, there are precautions you should take to make sure your personal information is safe. First and foremost, connect with care. If you're online through an unsecured network, you should be aware that individuals with malicious intent may have established a Wi-Fi network with the intent to eavesdrop on your connection. This could allow them to steal your credentials, financial information, or other sensitive and personal information. It’s also possible that they could infect your system with malware. Any free Wi-Fi should be considered to be “unsecure.” Therefore, be cautious about the sites you visit and the information you release. STOP. THINK. CONNECT. Here are 6 tips to remember when using Wi-Fi: • Keep an updated machine. Having the latest security software, operating system, web browser and apps can help protect you from the malware and other threats you may encounter when using Wi-Fi. • Don’t assume that the Wi-Fi connection is secure. Many hotspots don’t encrypt the information you send on the Wi-Fi network. • Do not log into accounts, especially financial accounts, when using public wireless networks. • Do not log onto sites that don’t seem legitimate, (clues could include the URL being misspelled, or not matching the name that you were given by the place of business). It’s not uncommon for cybercriminals to set up a Wi-Fi network called “free Wi-Fi” in airports, hotels, and other public places. • A cellular 3G/4G connection is generally safer than a Wi-Fi connection. • Consider turning off features on your computer or mobile devices that allow you to automatically connect to Wi-Fi. For More Information: For additional information, please visit: • OnGuardOnline.gov: Tips for Using Public Wi-Fi Networks • US CERT: Cyber Threats to Mobile Phones • US CERT: Holiday Traveling with Personal Internet-Enabled Devices • Microsoft Security: Four Safety Tips for Using Public Wi-Fi
  • 2. • Sophos: Hot Tips for Securing Your Wi The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. awareness is intended to help improve the organization’s overall cyber security posture. from their home computer. Organizations have permission and are encouraged to brand and commercial purposes. Sophos: Hot Tips for Securing Your Wi-Fi Network hly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, th awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non Brought to you by: hly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help While some of the tips may relate to maintaining a home computer, the increased This is especially critical if employees access their work network redistribute this newsletter in whole for educational, non-