{"id":4133,"date":"2019-10-31T16:55:40","date_gmt":"2019-10-31T20:55:40","guid":{"rendered":"http:\/\/blog.valdosta.edu\/it\/?p=4133"},"modified":"2019-11-04T08:34:08","modified_gmt":"2019-11-04T13:34:08","slug":"cybersecurity-awareness-protect-it","status":"publish","type":"post","link":"https:\/\/blog.valdosta.edu\/it\/2019\/10\/31\/cybersecurity-awareness-protect-it\/","title":{"rendered":"Cybersecurity Awareness: Protect IT"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"227\" src=\"https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB-644x227.jpg\" alt=\"Own, Secure, Protect IT. October 2019 National Cyberscurity Awareness Mont #BeCyberSmart\" class=\"wp-image-4111\" srcset=\"https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB-644x227.jpg 644w, https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB-300x106.jpg 300w, https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB-768x271.jpg 768w, https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB-930x328.jpg 930w, https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB.jpg 1559w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Browse Safely<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/security-awareness-training\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Article by: SANS Security Awareness (opens in a new tab)\">Article by: SANS Security Awareness<\/a><\/p>\n\n\n\n<p class=\"has-normal-font-size\">You may not realize it, but a common risk of working\nremotely or working from the road is having to connect to and work within\npublic Wi-Fi access points. These points might be the ones you\u2019d find in your\nhotel, airport, or local coffee shop. But how secure are these public networks?\nWho could be watching or recording what you are doing online?&nbsp;While a\nshared or public Wi-Fi connection is incredibly convenient while on the go, you\nare taking a risk at exposing your personal data and company information. <\/p>\n\n\n\n<p class=\"has-normal-font-size\">Here are a couple of key behaviors to reduce that risk of\ndata exposure for people traveling and accessing public Wi-Fi.<br \/>\n<br \/>\n<strong>Stay Updated<\/strong>: Begin by ensuring that your browsers and plugins always have the latest patches and updates. Cyber attackers are constantly strategizing ways to detect new vulnerabilities in the software you use, and your vendors are constantly patching it. Current and updated systems are much more difficult for cyber attackers to hack into, so don\u2019t ignore those system update recommendations. In many cases, enabling automatic updates is one of the simplest ways to ensure your system stays current and secure.<\/p>\n\n\n\n<p class=\"has-normal-font-size\">In addition, before installing any software, plugins, add-ons, or extensions, be sure to check your company\u2019s policies and procedures to ensure the programs are authorized. If you are unsure, simply ask your help desk for guidance.<br \/> <br \/> <strong>Encryption<\/strong>: Encryption is a technology that helps protect your information when transmitted over the Internet. When you connect to public Wi-Fi points, you want to be sure all of your activity online is encrypted, ensuring others cannot monitor or capture what you do online. For example, when you\u2019re browsing the web, you want to ensure your browser is connected to websites that are encrypted. Not sure if your browser connection is encrypted? Look to the top of your browser. If you see a padlock or HTTPS next to the website address, this is an indicator that your connection to the website is encrypted.<\/p>\n\n\n\n<p class=\"has-normal-font-size\"><strong>Tethering<\/strong>: Wi-Fi tethering, also known as a mobile hotspot, refers to the action of connecting one device, such as a smartphone or a tablet, to another, such as a laptop, so that you may share the internet connection between devices when a Wi-Fi connection is unavailable. When in doubt about the security of a public Wi-Fi network, it is good practice to tether your network connection off your smartphone instead of using the public Wi-Fi. While this may not always be possible, especially when traveling internationally, it is one of the most secure methods to connect to Wi-Fi while traveling.<br \/>  <\/p>\n\n\n\n<p class=\"has-normal-font-size\"><strong>Yourself<\/strong>: Ultimately <strong>you<\/strong> are the best defense. If something about the Wi-Fi connection seems odd or suspicious, simply don&#8217;t connect. Find another Wi-Fi network you feel more comfortable with or tether from your mobile device. In addition, many of today\u2019s online attacks are not targeting your technology but attempting to trick or fool you. If you receive an email, message, or phone call that seems odd or suspicious, especially highly urgent ones, it may be an attack. Always be on alert.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.valdosta.edu\/security\" target=\"_blank\" rel=\"noreferrer noopener\">Visit VSU Division of Information Security website for additional information.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Browse Safely You may not realize it, but a common risk of working remotely or working from the road is having to connect to and work within public Wi-Fi access points. These points might be the ones you\u2019d find in your hotel, airport, or local coffee shop. But how secure &hellip;<\/p>\n","protected":false},"author":104,"featured_media":4111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[357,3],"tags":[242,248,370,81],"class_list":["post-4133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips","tag-cyber","tag-cybersecurity","tag-information-security","tag-security"],"acf":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.valdosta.edu\/it\/wp-content\/uploads\/sites\/19\/2019\/10\/ncsam2019_logoB.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pau9Jr-14F","_links":{"self":[{"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/posts\/4133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/comments?post=4133"}],"version-history":[{"count":5,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/posts\/4133\/revisions"}],"predecessor-version":[{"id":4140,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/posts\/4133\/revisions\/4140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/media\/4111"}],"wp:attachment":[{"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/media?parent=4133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/categories?post=4133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.valdosta.edu\/it\/wp-json\/wp\/v2\/tags?post=4133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}