Beruflich Dokumente
Kultur Dokumente
T I P S A N D T E C H N I Q U E S T O P R O T E C T YO U R I N F O R M AT I O N
INSIDE
Passwords: Whats Wrong With Qwerty? Security Savvy
Test your knowledge after reading.
Special Tactics
Watch what you say in emails.
Closer Look
A DroidDream nightmare.
Global Warnings
Cybercrime headlines from around the world.
PPG
Safe email tips from PPG IT Security.
FL
FRONTLINE
Security Savvy
Test your knowledge after reading this issue. 1. True or False: Content posted on social media sites will go away if you just delete the files. 2. A strong password should be: a. Reused on all Web sites and applications, so theres only one password to remember b. Written somewhere on your desk because a strong password is too hard to remember c. Made by combining names of cartoon characters d. None of the above 3. Which statement about emails is false? a. Hackers are leaking emails. b. Deleting an email ensures that no one will see it. c. Companies can legally monitor emails. d. Every email leaves a trace. 4. What are some ways to protect yourself when using social media? a. Know and use privacy settings. b. Be selective about personal information you post. c. Change passwords often. d. All of the above.
:: Passwords:
FRONTLINE
S PECIAL TACTICS
Watch What You Say in Emails
Imagine having your emails published by hackers for the entire world to see. A number of recent news stories Wikileaks is only one have made it clear that email databases are sometimes hacked and the contents of the emails made public. This can occur whether or not the breach is widely known you may not even be aware that your emails are being read by unintended recipients. Because email is a simple, convenient way of communicating, its easy to forget that emails are company documents that can cause a lot of damage if they fall into the wrong hands. Whether its accidentally leaked or stolen by hackers, email can be used to place organizations at risk, damage reputations, and lay the groundwork for other criminal acts by people posing as the sender. More and more, emailing has replaced chatting with coworkers around the water cooler. The trouble is that around this new version of the water cooler, all of the conversation is being written down, and every email you write could wind up on the Internet or in court. Whether its sharing sensitive information, complaining about the boss, or forwarding a joke, its easy to write something in an email that you may later regret. Nowadays, you shouldnt expect any email that you write at work to remain private. Emails can be forwarded without your knowing it. If youre a high level employee, they can get reported to public newsgroups and made public at a later date. Its never a bad idea to write your emails with the idea that they could wind up on the front page of a newspaper. Many companies also monitor email to protect their proprietary information and make sure employees arent using email for non-work related activities. In most jurisdictions, emails can be read legally by your supervisor and serve as evidence for termination. Employees who assume their messages are gone when they delete them are often wrong. Every email leaves an electronic trace as it passes through the system. Even if you clear your inbox, draft, trash, and sent folders regularly, there may be a permanent record of your emails in the company system. Here are some tips for keeping safe. Be careful what you write treat all emails as though they are being monitored. Only send messages that you would be comfortable seeing in the newspaper. Limit your communications with family and friends. Dont send inappropriate material if youre thinking of adding, Delete this as soon as you read it, you shouldnt be sending that email. Be careful when using humor without face-to-face communication your joke may not be received in the spirit intended. Guard your email password to keep others from posing as you. FL
CLOSER LOOK
A DroidDream Nightmare
A recent malware attack on Android phones broke new ground for mobile viruses. Known as DroidDream, this Trojan horse is the first piece of Android malware to appear in Googles official Android App Market. It is also the most sophisticated piece of Android malware seen to date. DroidDream is also the first instance of Android malware that exploits two vulnerabilities in the Android phone operating system. It was able to bypass security features within the Android operating system and gain access to the phones system code. While the vulnerabilities were patched by Google last year, the majority of phones lacked the patch, allowing the attack to compromise more than 260,000 phones. In the attack, hackers pirated copies of 58 popular apps, inserted the Trojan, and posted the apps with slightly different names back on the Android Market. The hackers then used the malicious apps to gain substantial control of the affected phones. Once in place, the program forwarded phone-specific information including model, software version, and user identifiers -- to the hackers command-and-control server. A further phase served to maintain a connection to the server with the purpose of silently downloading additional programs and installing them as system applications on any infected device. Google removed 58 applications from the Android Marketplace and immediately took action to identify affected users and remotely remove the malicious applications from their smartphones. Google also developed a security update to push to affected phones, which should mitigate further information leaks or access by the malware-laden applications. If there was any claim that mobile malware isnt a serious threat, the appearance of DroidDream shattered it. A close look at DroidDream shows that criminal hackers are coming up with more ways to attack mobile devices. Users, while generally aware of cyber attacks that are prevalent on the PC, may have a good chance of being caught by surprise on the phone. FL
FRONTLINE
GLOBALWARNINGS
If you find yourself wondering why todays managers and security departments are concerned about employee security behaviors, take a look at todays headlines. These selected stories from around the globe make it clear that there are lots of good reasons to be careful.
FRONTLINE