Making Cyber Security Training Work For You
Lessons learned through the cyber security training should be applied to home computers as well in order to ensure protection of personal information. This is particularly important since the internet email systems offer far less filtering protection than that which is employed by DTI. Here are some rules to consider:
A recent change in focus on tactics deployed in the war against cyber crime places an emphasis on educating users about viruses, malware, SPAM, spear phishing, including cybercriminals' use of financial information. The emails typically come from what looks like a bank or other financial institution asking the recipient to go to a website to enter personal or confidential data. However, the website is bogus, created to match the real site as closely as possible to fool the user into entering personal or confidential data. Once the data is compromised, it can be used for almost any purpose.
Recently, the Judicial Information Center, in conjunction with the Department of Technology and Information (DTI), launched an initiative to educate state computer users about cyber crime and security. The focus is on heightening awareness about the impact and potential of breaches in cyber security in our jobs.
A computer-based training was created for users to familiarize users with these potential pitfalls so that they can recognize and avoid them if encountered. Opening an attachment, entering a link embedded in an email, executing an .exe file or merely opening an email that lures the user with phrases like: "YOU HAVE BEEN SELECTED," "SOMEONE IS LOOKING FOR YOU," "YOU ARE OWED MONEY BY THE FEDERAL GOVERNMENT,"and "REGARDING YOUR RECENT COURT APPEARANCE," are all common subject lines that hackers use to disguise their malicious intentions.