Module 4 – Retention and Orientation


(This video chapter begins at 04:04 and ends at 05:58. Click on the blue dot at the 04:04 timestamp to play the video for this module.)

 

Cyber Security Breaches

Cyber security breaches are the result of secure information being released to a treacherous environment. Whether the data is released intentionally or unintentionally, the consequences can have long-lasting effects, from harassment to identity theft

Our focus quote for this module:

Choosing a hard-to-guess, but easy-to-remember password is important!” – Kevin Mitnick

Phishing

Cyber criminals who use phishing scams aim to obtain personal information by appearing to be a legitimate source. Many times, they masquerade as a major company, such as a bank, appealing to your desire to keep your information safe.

For example, they may send an email that says, “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”

Clicking the link or responding to the email can take you to a website that looks authentic, but is in fact a spoof site that serves to steal your information and use it for malicious purposes, such as committing crimes using your name, or using your bank information for personal gain.

 

Identity Theft

Identity theft can be considered one of the worst case scenarios when it comes to cyber security breaches. Whether hacking into a company’s computer system to assume the identity of the company, or doing so to steal the identities of the company’s customers / clients, the end result can be disastrous.

Those who seek to steal another’s identity typically do so and move on quickly, making it difficult to track and prosecute the perpetrator. This is why “an ounce of prevention is worth a pound of cure”.

There are many ways to help prevent identity theft. Some examples are:

  • Be mindful of phishing websites
  • Utilize an Anti-virus / Anti-malware program
  • Don’t respond to unsolicited requests for secure information

Harassment

Cyber bullying is not limited to individuals. Cyberbullies can use their vices to ruin the reputation of a company as well. Many companies have social media accounts that allow the general public to post comments, complaints, and suggestions. Some use this opportunity to post cruel and negative comments, or even threats.

What are some ways to handle cyberbullies?

  • Do not immediately respond. When one feels attacked, the immediate tendency is to respond out of emotion. Doing so could escalate the issue, so take some time to process the information and compose yourself before dealing with the issue.
  • Tell the cyberbully to stop. Granted, this may not always work, but sometimes being told that the behavior is not acceptable is all one needs in order to cease.
  • Get the authorities involved. Contact the police. The police often have the necessary tools to track down the culprit and help put a stop to the behavior.

 

Cyber Stalking

Cyber stalking a company can include acts such as false accusations and defamation, which can affect the standing of the company in the community. The cyber stalker’s intention is typically to intimidate, or in some way influence, the victim. Cyber stalking is a criminal offense that is punishable under the anti-stalking laws.

Being found guilty of cyber stalking could lead to penalties from a restraining order against the assailant to the assailant serving jail time.

Anti-Stalking Tips:

  • Be sure you always have physical access control over your computer, to prevent the stalker from gaining that control without your knowledge.
  • Always log out of programs before stepping away from your desk. Utilize a screensaver and password.
  • Protect your passwords. Do not share them. Change them often.
  • Keep your security software updated.

 

Practical Illustration

Paula works for and also banks with 123 Bank. She received what appears to be an email from the bank that stated, “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.” As she got ready to click the link, something told her to consult with her co-worker, Emily, to confirm this is something that their bank does. Emily told Paula that their company doesn’t send out such emails. In fact, most companies do not.