Cyber threats are evolving – Are you?: Cyber Month week 3

It isn’t always obvious when someone is trying to trick you online. From text messages that look like they’re from your bank to phone calls that sound like they might be from your boss, staying ahead of phishing  is all about being vigilant.

Week 3 of Cyber Month is all about helping you recognize evolving cyber threats and how to stay ahead of them. We’ll discuss how taking a few simple steps today helps protect your identity and finances now and down the road.

Phishing, smishing, and vishing

Phishing messages are designed to make you react quickly – either negatively or positively – so cyber criminals can attempt to steal your money or information. They are often disguised as emails, text messages (smishing)phone calls (vishing) and even direct messages (DMs) on social media from places or people you trust – like a delivery company, your bank, a friend, and even your job. They may threaten you by insisting that you need to click a link  to get out trouble or offer you a deal that’s too good to be true if you give up sensitive information. But acting on suspicious messages can cause you to lose your finance or even your identity.

This week, we’ll discuss how to identify suspicious messages and delete them, how to report texts by forwarding them to 7726 (SPAM), and when to be cautious and hang up on suspicious calls so future you will thank you.

AI and sophisticated threats

Artificial intelligence can help us achieve things faster than ever before, like summarizing research, detailing important meetings, and even writing funny song lyrics for friends. Unfortunately, cyber criminals are using it too. AI generated phishing messages, deepfake voice calls, and even realistic fake videos are making it harder than ever to tell what’s real and what isn’t.

The good news is that you don’t need to outsmart robots (yet) – you just need to be a little more skeptical online. This week, we’ll discuss how to spot the signs of AI generated text, images, and videos and how cyber criminals are using new technology to make their scams more believable. We’ll explore how staying cautious today can even help you outsmart tomorrow’s most complicated scams.

Looking ahead

Cyber threats are evolving, but so is your knowledge! Take time this week to learn more about spotting suspicious messages, AI generated content, and how to protect your digital identity. With a few simple steps, your future self will thank you for not clicking that phishing message and getting your hopes up for that fake vacation.

Bringing your devices up to speed: Cyber Month week 2

These days, your daily routine likely revolves around multiple smart devices. Whether you’re ordering groceries through your smart speaker, getting directions from your phone, or streaming the latest series on your smart TV, the time you spend now and, in the future, is directly tied to the technology you use.

When those devices are secure and running smoothly, your day will follow suit. That’s why week two of Cyber Month is all about device security. Whether it’s setting up strong passcodes, backing up  your files, or knowing how to be safe connecting to public Wi-Fi , securing your devices now will be something your future self will be grateful for.

Securing your smart devices

Your phone and laptop are important but certainly aren’t the only devices that need to be securedSmart devices like your speakers, watches, thermostats and other appliances are all connected to the internet – and if they’re not secured, they can be used to snoop, steal data, or even break into your home network.

This week, we’ll discuss small steps you can take to secure your gadgets like changing your default  passwords (yes, even the one on your TV!) and disabling features, like Bluetooth, when you aren’t using them. We’ll also discuss setting up new devices, updating privacy settings, and how a few small steps can make a big difference in your future.

Storage and backups

We all have important files, from photos to personal documents and work projects. But what happens if your device is lost, stolen, or compromised by malwareBacking up your files ensures you won’t lose your documents if something unexpected happens.

There are many backup options available to you that rely on cloud storage  or external hard drives . We recommend using a combination of at least two storage options for your most important data, to be extra safe in case one fails. This week, we’ll discuss how regular backups can protect you in the future, like making sure stressful situations – like your computer crashing before a project deadline – a lot more manageable.

Private and public networks

When you think about protecting your devices, you might not be thinking about those running your home network, such as your router . Since your Wi-Fi network  is a gateway to all your connected devices, it’s extremely important to protect it from potential intruders (and possibly your next door neighbours). One of the easiest ways to stay safe is to change your default network name and password .

If you’re on the go, connecting to public Wi-Fi can be tempting. But public networks aren’t always safe. They can be easy targets for cyber criminals looking to steal your data or information. To protect yourself, avoid accessing sensitive accounts like banking or email on unsecured networks. And if you do need to access those accounts, consider using a virtual private network (VPN) for added privacy and security.

This week, we’ll talk about protecting your networks and your devices with simple steps to reduce disruptions now and later.

Looking ahead

We rely on our devices to stay connected so taking steps to make sure they’re secure can ensure they aren’t putting your data at risk. Take a moment to review your devices and make sure they are backed up, updated, and connected to secure networks.

Preparing your future self today: Cyber Month week 1

Imagine: it’s 9:59 am, and your favourite artist’s concert tickets are going on sale at 10 am. You log in easily, click “Book Now” and you’re in. No fumbling for login credentials , and no forgotten password  reset thanks to your password manager. That’s the benefit of good account security: it doesn’t just protect you from cyber threats, it also makes life easier for future you — whether it’s buying tickets, filing taxes, or quickly logging into a meeting on a busy day.

The first week of Cyber Month is all about learning how to protect your accounts now to save yourself time, stress, and even money in the future.

Passphrases, passwords, and password managers

Passwords and passphrases are your first line of defence when it comes to protecting your accounts. They should be unique to each account and complex. Passwords should be at least 12 characters long and include random numbers and characters. Passphrases are made of four or more random words, at least 15 characters; they’re easier to remember and harder for attackers to guess. It’s best to use a strong passphrase  when possible.

Let’s face it: no one can memorize dozens of strong and unique passwords or passphrases. That’s where trusted password managers come in. These tools store your credentials securely, so you don’t have to remember them — helping when you need to sign in quickly, book a flight, or file important information all while staying secure. This week, we’ll discuss how to create strong passwords and passphrases, how to choose the best password manager for your needs, and how it can make things easier in the future.

Multi-Factor Authentication

Multi-factor authentication (MFA) adds an extra layer of security to your accounts by requiring a second verification step when you log in. This means you’ll get a notification when an attempt is made to log into your accounts, meaning you have more control over who has access to them. MFA comes in many forms and can be a one-time use PIN sent to your phone, an authentication  app that requires you to confirm your identity, a token, or biometrics like your thumbprint.

MFA can dramatically reduce the risk of losing your account credentials. This week, we’ll discuss different ways to use MFA and how it protects you when you might need it the most.

Social media account security

Your social media accounts are part of your digital identity. They’re a great way to share your life and stay in touch with friends and family, but if you’re not careful, they can also be an easy way for cyber criminals to access your information. Taking precautions before you post, like limiting who can see your information, disabling location sharing when you aren’t using it, and managing your account settings, can go a long way in protecting your privacy.

Protecting your accounts with strong, unique passwords, enabling MFA, and keeping apps and devices updated can also help keep you safe. This week, we’ll discuss securing your social media  accounts and how simple steps can help protect your identity now and later.

Looking ahead

Take a moment today or this week to review your accounts. With a few simple steps, your future self will thank you. Learn more about passwords and passphrases, password managers, MFA, and social media by following along throughout Cyber Month.

Cyber Month week 4: The most proactive generation

Staying a step ahead of cyber criminals is one of the best ways to embody the spirit of Generation Cyber Safe. Let’s look to Gen X for guidance on this one: they know it’s one of the easiest ways you can avoid online threats, especially in professional settings where the stakes are high. In fact, 59% of Gen X business owners say their company files are backed up regularly.

Let’s dive into how you can follow in their footsteps and be proactive about online threats as part of Generation Cyber Safe.

Schedule and automate backups

In the event of a cyber attack  like ransomware backups are your first line of defence against losing data. Set up automatic backups on your personal and business devices to ensure that your data is always saved somewhere safe. Schedule these backups to run regularly to maintain updated copies of your critical information.

It’s equally important to test your back ups regularly to make sure they can be restored without issues. Make it a habit to verify that your backups are working correctly and that you can recover your data when needed.

Store data safely

Whether you use cloud storage , external hard drives  or a hybrid approach, finding one or more ways to store data that works for you is an important part of protecting your information. Cloud storage offers easy accessibility, while physical storage provides a secure offline backup. Consider your needs and choose the best combination to keep your data protected.

Make your business more cyber safe

Informing yourself and your team about cyber security threats and best practices is essential. Regular training sessions can help everyone recognize and respond to cyber threats like phishing  and ransomware. Make use of resources such as online courses, workshops and webinars to stay informed about the latest cyber security trends and techniques.

Having an incident response plan is important for any small or medium business. Make sure your incident response plan includes the processes and procedures to follow to detect, respond and recover from a cyber incident . Regularly update  and test your response plan to make sure it works for you.

Remember that remote or hybrid work introduces additional cyber security challenges. Ensure employees use secure Wi-Fi  connections, a virtual private network  (VPN) and follow company your cyber security plan when working remotely. Provide them with the necessary tools and training to maintain a secure work environment regardless of their location.

Conclusion

Being proactive in your cyber security practices is all about awareness and being prepared to respond effectively. By securing your backups and maintaining good cyber security, you can protect yourself and your business as a member of Generation Cyber Safe!

Cyber Month week 3: The most social generation

Something all generations have in common is the desire to stay connected. When it comes to being online, however, there are a lot of threats like phishing  that can make staying social difficult. Need help staying secure? Millennials can help – in fact, 82% of this generation is confident in knowing how to identify a phishing email or malicious link ! Here’s a glimpse of what we’re covering in week three to help you become part of Generation Cyber Safe.

Phishing

Phishing is a common tactic that cyber criminals use to steal personal and financial information. Phishing messages are unsolicited messages from cyber criminals who pretend to be someone they are not, like your bank. Cyber criminals have become increasingly sophisticated in their phishing campaigns, which is why it’s so important to learn the signs. This week, we’re discussing different ways you can spot phishing and how to be cautious online.

Social media

Social media platforms are a great way to stay in touch with family and connect with friends. But if you aren’t careful online, social media  can also be an easy way for cyber criminals to learn more about you so they can steal your information. There are different ways to stay safe online, like spotting phishing, reviewing privacy settings and keeping your personal information private.

Social engineering

Social engineering is a form of phishing used by cyber criminals to steal sensitive information by manipulating victims. For example, a cyber criminal may contact you by email or over the phone using facts that you have made public (like posting where you work on social media) to make their request seem legitimate. This week, find out how to spot social engineering  and how to protect your personal information from being exploited.

Identity theft and protecting your digital identity

Your digital identity is an online record of your personal information. It could include something as simple as your email address or social media account, or more sensitive information like your social insurance number (SIN), passwords and even your financial information. Explore ways to protect your digital identity like knowing how to spot phishing, keeping your information private, securing your accounts and more.

Artificial intelligence (AI) generated content

The rise of artificial intelligence (AI) generated content can make it more difficult to determine whether something you see online is real or fake. Even if you don’t believe what you see, disinformation can create doubt and cause confusion. There are tools that can help fact check disinformation like reverse image searching and tips on how to spot spoofing  and other scams.

Conclusion

You can be part of Generation Cyber Safe by learning how to stay safe while connecting with others online! Learn more this week by getting familiar with the signs of phishing and social engineering, safe social media habits and learning how to spot AI-generated content.

Cyber Month week 2: The Most Resourceful Generation

Every generation needs the right tools to succeed, especially when it comes to staying safe online. Becoming part of Generation Cyber Safe means getting familiar with the tools and resources needed to protect yourself from cyber threats. This is a great time to talk to the Gen Zs in your life, as 88% of this generation uses tools like multi-factor authentication  (MFA) regularly! Here are some of the topics for this week.

Anti-virus protection

Anti-virus software  is one of the best ways to protect your computer against viruses and malware . It works by scanning your devices to detect, identify and remove malicious files. Some anti-virus software  can also warn you of malicious websites and monitor suspicious program behaviours. Discover how to choose the right anti-virus software for your needs.

Automatic updates

Keeping your operating system and software updated is one of the easiest ways to protect your devices and your information from cyber threats. Updates fix security issues and add new features that allow you to get more out of your device. Find out why enabling automatic updates for all software on your devices can make cyber safety even easier.

Virtual private network (VPN)

virtual private network (VPN) is a secure connection between your device and the internet. A VPN provides you with additional security and privacy while you’re online by securing and encrypting your data. This can be helpful when you’re connecting to an unsecured network , like the free Wi-Fi  at your favourite coffee shop. Discover how and why a VPN is a critical tool to help you get cyber safe.

Cyber security awareness training

Cyber security awareness and training is important at home, school and work. You can become a cyber champion by encouraging challenges or activities that get everyone involved – like seeing who can report the most scam emails in a month. This week, be sure to look into cyber security training resources like the Cyber Centre’s free online training course.

Malware and ransomware

Malware, or malicious software, is a common method that cyber criminals use to infect systems and devices. Ransomware is a form of malware that infects your computer or device and locks you out of accessing the system and files. Cyber criminals will trick you into downloading ransomware  by disguising links or downloadable files to look legitimate. Find out about the methods and tools you can use to protect yourself.

Conclusion

The right tools and training can help you become part of Generation Cyber Safe! Learn more about anti-virus  protection, automatic updates, VPNs and how to protect yourself from threats like malware and ransomware.

Cyber Month week 1: The Most Secure Generation

October is Cyber Security Awareness Month in Canada and this year we’re ushering in a new generation: Generation Cyber Safe.

Online security affects all Canadians, regardless of what year they were born. That’s why this year’s theme, Generation Cyber Safe, celebrates the unique strengths each of us has when it comes to staying safe online. This generation is all about attitude: being committed to keeping yourself secure online and making the internet a safe place for everyone.

Being a part of Generation Cyber Safe means understanding the importance of securing your accounts – which is something that 95% of Baby Boomers are leading the way in! This week, we’re exploring the various ways to improve your account security. Here are some topics we’re covering during week one:

Strong passwords and passphrases

Passwords and passphrases are your first line of defence when it comes to protecting your accounts. This week, find out how to create strong and unique passwords and passphrases for your accounts and why it’s so important. To get started, make sure your passwords are at least 12 characters long and include random numbers and characters. Your passphrases should be at least 15 characters long and include four or more random words.

Password managers

Creating (and remembering) strong and unique passwords and passphrases for each of your accounts can feel overwhelming. Password  managers can help! Learn how to choose the best password manager for you and how password managers can save you time and effort when it comes to account security.

Multi-factor authentication (MFA)

Multi-factor authentication  (MFA) adds an extra layer of security to your accounts by requiring a second form of verification in addition to your password or passphrase . This can be a PIN, a biometric (like a fingerprint or facial recognition) or an object you own, like a token. Be sure to enable MFA whenever possible to improve your account security.

Credential Stuffing

Credential stuffing is an automated cyber attack  that uses stolen credentials  from one website to gain unauthorized access to other accounts sharing the same username, email and password combination. It’s one of the main reasons why you should use unique passwords and passphrases for each of your accounts. Using unique passwords, MFA and password managers can help prevent these attacks.

Limiting the information that you share online

Cyber criminals are experts at stealing information. One of the ways they do this is by looking at your social media  accounts or searching information about you online, like discovering where you work and who you’re connected with online. Limiting the information that you share online can help to avoid your accounts from getting compromised.

Conclusion

Join Generation Cyber Safe by learning how to secure your accounts with MFA, password managers, strong passwords and passphrases and more. We’ll have more tips each week this month.

Spear Phishing Scams — Stay Vigilant

Spear Phishing.

Recently, HR and Payroll received several obviously fake emails to update direct deposit information for payroll.

The messages were well researched!

  • sent to the personal email addresses of different HR/Payroll employees
  • greeted the HR/Payroll employee by name
  • signed in the name of a real Menno employee
  • includes the real employee’s position or job title

This is not random phishing but targeted SPEAR PHISHING !!  HR and Payroll are not falling for these attempts to steal pay cheques.

 

What should you do?

  1. Please be alert.  If you get any message that seem fishy, immediately forward to Support@BeAdaptive.ca and mark the subject “URGENT”.
  2. During this time of transition in leadership (any time, but especially now), if anyone gets messages requesting gift cards, or anything out of the ordinary etc. please send a copy to Pearl when you forward the message to Adaptive.
  3. Remember, too:  If anyone has fallen victim to any type of phishing or scam email, call Adaptive immediately 604-357-3456.  They can help put a stop to things faster when they are informed early.  They are on call 24×7 to keep us safe.  (YES, call at midnight if you have to… much better than waiting hours until morning.)
  4. Please share this message with your team and talk about it with your teamEveryone who has email is a potential target.  Awareness is a powerful defense.

Thanks for doing a great job and stay vigilant!!

 

Cybersecurity Awareness Part 4: Recognize and report phishing – see it so you don’t click it!

It’s easy to avoid a scam email, but only once you know what to look for. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Recognizing & Reporting Phishing!

Cybersecurity Awareness Part 3: Updating software keeps your information secure!

One of the easiest ways to keep your information secure is to keep your software and apps updated. At Menno Place, we can make a huge difference by practicing the basics of cybersecurity. This week, let’s learn about Updating Software!