It seems like several of us are working from home now to keep our physical selves safe. Have you ever considered the safety of your organization’s information though? There are several quick, easy ways to ensure cyber security from your couch. This video series will guide you through different ways to keep your information, data and technology safe, while you’re diligently adjusting to the new work environment.
About the Narrator
Dr. Doug Jacobson is a University Professor at Iowa State University and the director of the Information Assurance Center at Iowa State. While Dr. Jacobson teaches cyber security courses, he is also dedicated to teaching all—students and working professionals—what they can do to ensure their information and security. With Dr. Jacobson’s experience in leading outreach efforts, he is involved with the Iowa Cyber Hub’s outreach, curriculum and cyber security content.
Part 1: Overview
Explore different methods of keeping work information and technology safe.
Part 2: Passwords
Dive into the importance of strong passwords and how to curate the best passwords for work, home and play.
Part 3: Email
Pinpoint traits of fraudulent emails and what to do if you receive one.
Part 4: The Web
Understand how the web and attackers use your data. Additionally, identify tactics to mitigate the risk of an attack sourcing from the web.
Part 5: Malware
Learn how malware gets on a computer and how you can prevent it before it attacks your devices.
In the last video of this series, we will review the biggest tips on securing your information and technology—work and personal—from your home.
Report Scams & Fraud
More on Malware
Send your questions to firstname.lastname@example.org
Q1: How do I know my home wireless is encrypted? If it isn’t, how do I get it encrypted?
A1: A couple of ways. If you have to enter a password when you first start using it, it is encrypted. Another way is by looking at the wireless connection on your device. It is says it is not secure, then your provider (Medicom, Century Link, etc.) should be able to help.
Q2: What do I need to know about VPN at home?
A2: Contact your emploer to see if they have a VPN and if you need to use it. Here is what Iowa State says: https://www.it.iastate.edu/remotework
Q3: How do I know password keepers (1password and lastpass) are secure?
A3: They are protected by a passphrase (a sentence you type). So, a typical sentence of 5-10 words is impossible for someone to guess. An attacker would need to have your encrypted password file and also know the sentence used for the passphrase.
Q4: How do one-time-use passwords work?
A4: A good example is Google Authenicator. After you sync your device to the website, Google Authenticator will generate random six-digit codes that change every 10 seconds or so. You’d enter the code that is displayed as your one-time password. So, the next time you use a Google Authenticator code, it would be different than the last one you entered.
Q5: When I look at my email, I see a preview in a box below. Is it true that I don’t offically open the document until I click on it?
A5: Yes, that is correct. You are reading it, but in some cases, the email reader is set up to not download remote images unless given permission to do so. Attachments, however, are not opened or saved until you click on them.
Q6: Is it any safer to copy a URL from an email and paste it in a new tab, rather than clicking on the link in the email?
A6: Not much safer. Pasting a URL will show the true URL the email wants you to visit (hyperlinked text in an email might not display the true URL), but you still risk visiting a bad website. For example, if the link says usbank.com, and you copy and paste the URL and see usbank.com.co, then you might notice it is a bad website. Attackers can be good at using names that are close, like usbamk.com. At first glance, they look the same, but they, indeed, are different.
InfraGard National Members Alliance wishes to thank Dr. Doug Jacobson and the staff at the Iowa Cyber Hub for making this available to InfraGard members