Cyber Month week 4: The most proactive generation

Staying a step ahead of cyber criminals is one of the best ways to embody the spirit of Generation Cyber Safe. Let’s look to Gen X for guidance on this one: they know it’s one of the easiest ways you can avoid online threats, especially in professional settings where the stakes are high. In fact, 59% of Gen X business owners say their company files are backed up regularly.

Let’s dive into how you can follow in their footsteps and be proactive about online threats as part of Generation Cyber Safe.

Schedule and automate backups

In the event of a cyber attack  like ransomware backups are your first line of defence against losing data. Set up automatic backups on your personal and business devices to ensure that your data is always saved somewhere safe. Schedule these backups to run regularly to maintain updated copies of your critical information.

It’s equally important to test your back ups regularly to make sure they can be restored without issues. Make it a habit to verify that your backups are working correctly and that you can recover your data when needed.

Store data safely

Whether you use cloud storage , external hard drives  or a hybrid approach, finding one or more ways to store data that works for you is an important part of protecting your information. Cloud storage offers easy accessibility, while physical storage provides a secure offline backup. Consider your needs and choose the best combination to keep your data protected.

Make your business more cyber safe

Informing yourself and your team about cyber security threats and best practices is essential. Regular training sessions can help everyone recognize and respond to cyber threats like phishing  and ransomware. Make use of resources such as online courses, workshops and webinars to stay informed about the latest cyber security trends and techniques.

Having an incident response plan is important for any small or medium business. Make sure your incident response plan includes the processes and procedures to follow to detect, respond and recover from a cyber incident . Regularly update  and test your response plan to make sure it works for you.

Remember that remote or hybrid work introduces additional cyber security challenges. Ensure employees use secure Wi-Fi  connections, a virtual private network  (VPN) and follow company your cyber security plan when working remotely. Provide them with the necessary tools and training to maintain a secure work environment regardless of their location.

Conclusion

Being proactive in your cyber security practices is all about awareness and being prepared to respond effectively. By securing your backups and maintaining good cyber security, you can protect yourself and your business as a member of Generation Cyber Safe!

Cyber Month week 3: The most social generation

Something all generations have in common is the desire to stay connected. When it comes to being online, however, there are a lot of threats like phishing  that can make staying social difficult. Need help staying secure? Millennials can help – in fact, 82% of this generation is confident in knowing how to identify a phishing email or malicious link ! Here’s a glimpse of what we’re covering in week three to help you become part of Generation Cyber Safe.

Phishing

Phishing is a common tactic that cyber criminals use to steal personal and financial information. Phishing messages are unsolicited messages from cyber criminals who pretend to be someone they are not, like your bank. Cyber criminals have become increasingly sophisticated in their phishing campaigns, which is why it’s so important to learn the signs. This week, we’re discussing different ways you can spot phishing and how to be cautious online.

Social media

Social media platforms are a great way to stay in touch with family and connect with friends. But if you aren’t careful online, social media  can also be an easy way for cyber criminals to learn more about you so they can steal your information. There are different ways to stay safe online, like spotting phishing, reviewing privacy settings and keeping your personal information private.

Social engineering

Social engineering is a form of phishing used by cyber criminals to steal sensitive information by manipulating victims. For example, a cyber criminal may contact you by email or over the phone using facts that you have made public (like posting where you work on social media) to make their request seem legitimate. This week, find out how to spot social engineering  and how to protect your personal information from being exploited.

Identity theft and protecting your digital identity

Your digital identity is an online record of your personal information. It could include something as simple as your email address or social media account, or more sensitive information like your social insurance number (SIN), passwords and even your financial information. Explore ways to protect your digital identity like knowing how to spot phishing, keeping your information private, securing your accounts and more.

Artificial intelligence (AI) generated content

The rise of artificial intelligence (AI) generated content can make it more difficult to determine whether something you see online is real or fake. Even if you don’t believe what you see, disinformation can create doubt and cause confusion. There are tools that can help fact check disinformation like reverse image searching and tips on how to spot spoofing  and other scams.

Conclusion

You can be part of Generation Cyber Safe by learning how to stay safe while connecting with others online! Learn more this week by getting familiar with the signs of phishing and social engineering, safe social media habits and learning how to spot AI-generated content.

Cyber Month week 2: The Most Resourceful Generation

Every generation needs the right tools to succeed, especially when it comes to staying safe online. Becoming part of Generation Cyber Safe means getting familiar with the tools and resources needed to protect yourself from cyber threats. This is a great time to talk to the Gen Zs in your life, as 88% of this generation uses tools like multi-factor authentication  (MFA) regularly! Here are some of the topics for this week.

Anti-virus protection

Anti-virus software  is one of the best ways to protect your computer against viruses and malware . It works by scanning your devices to detect, identify and remove malicious files. Some anti-virus software  can also warn you of malicious websites and monitor suspicious program behaviours. Discover how to choose the right anti-virus software for your needs.

Automatic updates

Keeping your operating system and software updated is one of the easiest ways to protect your devices and your information from cyber threats. Updates fix security issues and add new features that allow you to get more out of your device. Find out why enabling automatic updates for all software on your devices can make cyber safety even easier.

Virtual private network (VPN)

virtual private network (VPN) is a secure connection between your device and the internet. A VPN provides you with additional security and privacy while you’re online by securing and encrypting your data. This can be helpful when you’re connecting to an unsecured network , like the free Wi-Fi  at your favourite coffee shop. Discover how and why a VPN is a critical tool to help you get cyber safe.

Cyber security awareness training

Cyber security awareness and training is important at home, school and work. You can become a cyber champion by encouraging challenges or activities that get everyone involved – like seeing who can report the most scam emails in a month. This week, be sure to look into cyber security training resources like the Cyber Centre’s free online training course.

Malware and ransomware

Malware, or malicious software, is a common method that cyber criminals use to infect systems and devices. Ransomware is a form of malware that infects your computer or device and locks you out of accessing the system and files. Cyber criminals will trick you into downloading ransomware  by disguising links or downloadable files to look legitimate. Find out about the methods and tools you can use to protect yourself.

Conclusion

The right tools and training can help you become part of Generation Cyber Safe! Learn more about anti-virus  protection, automatic updates, VPNs and how to protect yourself from threats like malware and ransomware.

Cyber Month week 1: The Most Secure Generation

October is Cyber Security Awareness Month in Canada and this year we’re ushering in a new generation: Generation Cyber Safe.

Online security affects all Canadians, regardless of what year they were born. That’s why this year’s theme, Generation Cyber Safe, celebrates the unique strengths each of us has when it comes to staying safe online. This generation is all about attitude: being committed to keeping yourself secure online and making the internet a safe place for everyone.

Being a part of Generation Cyber Safe means understanding the importance of securing your accounts – which is something that 95% of Baby Boomers are leading the way in! This week, we’re exploring the various ways to improve your account security. Here are some topics we’re covering during week one:

Strong passwords and passphrases

Passwords and passphrases are your first line of defence when it comes to protecting your accounts. This week, find out how to create strong and unique passwords and passphrases for your accounts and why it’s so important. To get started, make sure your passwords are at least 12 characters long and include random numbers and characters. Your passphrases should be at least 15 characters long and include four or more random words.

Password managers

Creating (and remembering) strong and unique passwords and passphrases for each of your accounts can feel overwhelming. Password  managers can help! Learn how to choose the best password manager for you and how password managers can save you time and effort when it comes to account security.

Multi-factor authentication (MFA)

Multi-factor authentication  (MFA) adds an extra layer of security to your accounts by requiring a second form of verification in addition to your password or passphrase . This can be a PIN, a biometric (like a fingerprint or facial recognition) or an object you own, like a token. Be sure to enable MFA whenever possible to improve your account security.

Credential Stuffing

Credential stuffing is an automated cyber attack  that uses stolen credentials  from one website to gain unauthorized access to other accounts sharing the same username, email and password combination. It’s one of the main reasons why you should use unique passwords and passphrases for each of your accounts. Using unique passwords, MFA and password managers can help prevent these attacks.

Limiting the information that you share online

Cyber criminals are experts at stealing information. One of the ways they do this is by looking at your social media  accounts or searching information about you online, like discovering where you work and who you’re connected with online. Limiting the information that you share online can help to avoid your accounts from getting compromised.

Conclusion

Join Generation Cyber Safe by learning how to secure your accounts with MFA, password managers, strong passwords and passphrases and more. We’ll have more tips each week this month.

Spear Phishing Scams — Stay Vigilant

Spear Phishing.

Recently, HR and Payroll received several obviously fake emails to update direct deposit information for payroll.

The messages were well researched!

  • sent to the personal email addresses of different HR/Payroll employees
  • greeted the HR/Payroll employee by name
  • signed in the name of a real Menno employee
  • includes the real employee’s position or job title

This is not random phishing but targeted SPEAR PHISHING !!  HR and Payroll are not falling for these attempts to steal pay cheques.

 

What should you do?

  1. Please be alert.  If you get any message that seem fishy, immediately forward to Support@BeAdaptive.ca and mark the subject “URGENT”.
  2. During this time of transition in leadership (any time, but especially now), if anyone gets messages requesting gift cards, or anything out of the ordinary etc. please send a copy to Pearl when you forward the message to Adaptive.
  3. Remember, too:  If anyone has fallen victim to any type of phishing or scam email, call Adaptive immediately 604-357-3456.  They can help put a stop to things faster when they are informed early.  They are on call 24×7 to keep us safe.  (YES, call at midnight if you have to… much better than waiting hours until morning.)
  4. Please share this message with your team and talk about it with your teamEveryone who has email is a potential target.  Awareness is a powerful defense.

Thanks for doing a great job and stay vigilant!!

 

Cybersecurity Awareness Part 4: Recognize and report phishing – see it so you don’t click it!

It’s easy to avoid a scam email, but only once you know what to look for. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Recognizing & Reporting Phishing!

Cybersecurity Awareness Part 3: Updating software keeps your information secure!

One of the easiest ways to keep your information secure is to keep your software and apps updated. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Updating Software!

Cybersecurity Awareness Part 2: Keep your passwords safe!

Passwords are the keys to your digital castle. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Strong Passwords & Password Managers!

October is Cybersecurity Awareness month! Part 1: Multi-Factor Authentication adds protection.

There are all kinds of ways to keep your online data protected. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Multi-Factor Authentication!

How to Report Malicious Spam Email

If you receive a suspicious email, the FIRST thing to do is report it to our IT company:

Adaptive ITwww.beadaptive.ca

604.357.3456

local: 2241

supportATBeAdaptive.ca  |  (replace AT with @)