Category: Cyber-Security

Staying Safe Online – August 2, 2017

Gaming Online Safely and Securely
Online gaming is a great way to have fun; however, it also comes with its own set of unique risks. What makes online gaming so fun is that you can play and communicate with others from anywhere in the world. While the vast majority of people online are out to have fun just like you, there are those who want to cause harm. Here are some steps you should take to stay secure:
Be cautious of any messages that ask you to take an action, such as clicking on a link or downloading a file. Just like email phishing attacks, bad guys will attempt to fool or trick you in online games into taking actions that can infect your computer or steal your identity.
If a message seems odd, urgent, or too good to be true, be suspicious that it may be an attack.
Many online games have their own financial markets where you can trade, barter, or even buy virtual goods. Just like in the real world, there are fraudsters who will attempt to trick you and steal your money or any virtual currency you have accumulated. Deal only with people that have established, trusted reputations.
Use a strong passphrase for any gaming accounts. If your game offers two-step verification, use it. In addition, make all of your online accounts have a different password. That way, if one game is compromised, your other accounts are safe. Can’t remember all your passwords? Consider a password manager.
Bad guys may attempt to hack into or take over the computer you are gaming on. You need to take steps to protect it:
Secure your computer by always running the latest version of the operating system and the gaming software. Old and outdated software have known vulnerabilities that attackers can exploit and use to hack into your computer.
Use anti-virus software. Ensure that it is updated and checking any files you run in real time.
Download gaming software from only trusted websites. Quite often, cyber attackers will create a fake or infected version of a game, then distribute it from their own server. Gaming add-on packs are frequently used to add new features. Attackers sometimes infect these gaming packs with malware.
In addition, if any add-on requires you to disable your anti-virus or make changes to your security settings, do not use it. Underground markets have sprung up to support cheating activity. Many cheating programs are themselves malware that will infect your computer. 
Never install or use any type of cheating software or websites. Always be just as careful playing games on your mobile devices as you would your computer. Cyber attackers are beginning to target mobile devices.
For Parents or Guardians
Children require extra protection and education when gaming online. Know what games they are playing and make sure the games are age appropriate for your child. Limit the amount of information your kids share online.; they should never share their password, age, phone number, or home address. One trick to get kids talking is to ask them to show you how their games work; have them walk you through their online world and show you what a typical game looks like.
A Public Service Announcement Courtesy of Cedar Valley Bank & Trust

Staying Safe Online – June 14, 2017

World Elder Abuse Awareness Day, June 15: Protect Yourself From Scans
There are many scams out there than can ensnare even savvy consumers. Many are designed specifically to target seniors. Scammers are professional liars and can be very convincing. They may contact you through the mail, email, social media, on-line dating sites, on the phone, or even in public. This guide will help you learn to recognize common warning signs of scams and simple steps that you can take to protect yourself.
Is It A Scam?
1. Is the sales person using high pressure sales tactics? Scams often say things like, “Act Now!”; “Time is running out!”; “This is a onetime offer!”
2. Are you being asked to pay upfront fees? Lottery and sweepstakes scams often employ this tactic. If you really won something the fees can be taken out of your winnings.
3. Are you being told that you won a contest that you didn’t enter? Lottery and sweepstakes scams almost always start this way. You can’t win a contest that you didn’t enter.
4. Have you been scammed in the past? Often scam victims have their personal contact information sold to other con artists. You may get unsolicited calls from people promising to get your money back or provide other remedies or offers. These ‘offers’ can be scams too. Beware!
5. Did you receive unsolicited mail, emails, or phone calls for services that you were not seeking? Research the companies that you want to employ. Many scams begin with someone knocking on your door offering services, or sending out promotional materials. This often happens in the case of home repair scams.
6. Are you being contacted by the police over the phone? Verify that they are who they say they are. Some scams begin with a person pretending to be a police officer who tells you that they are concerned that you have been a victim of a crime. They then proceed to solicit your personal information. In truth, the police will contact you in person if they have questions for you or believe that you have been a victim of a crime.
How To Protect Yourself
1. Sign up for the Do Not Call Registry at www.donotcall.gov.
2. When no longer needed, shred junk mail, old bills, bank statements and any other documents that have personal identifying information.
3. Don’t give out personal information over the phone unless you originated the call and you know with whom you are talking. Particularly safeguard your social security number.
4. It is ok to be rude. If a sales person calls you or comes to your door who does not seem to be taking no for an answer, it is ok to terminate the conversation. Hang up the phone or close the door. You don’t have to let yourself be pressured into anything.
5. Never sign something that you don’t understand. Have a trusted and unbiased professional assist you when enter contracts or signing legal documents.
6. If you hire someone for personal assistance services, in home care services, etc. ensure that they have been properly screened with criminal background checks completed.
7. Learn about scams and stay informed.
– Sign up for AARP’s Fraud Watch: http://action.aarp.org/site/SPageNavigator/FWN Registration Page.html
– Check out AARP’s interactive national fraud map: http://action.aarp.org/site/PageNavigator/FraudMap.html
– Consumer Financial Protection Bureau offers information and tools for older Americans:
www.consumerfinance.gov/older-americans
– The Financial Fraud Enforcement Task Force offers resources and reports to help protect yourself against common types of frauds and scams: www.stopfraud.gov/protect.html
– Stay alert to common frauds and scams by checking consumer protection sites such as www.Fraud.org
– External Web Site Policy and FBI Common Fraud Schemes: www.fbi.gov/scams-and-safety/common-fraud-schemes
A Public Service Announcement Courtesy of Cedar Valley Bank & Trust

Staying Safe Online – June 7, 2017

Lessons From WannaCry
Recently, you most likely watched widespread news coverage of a new cyber attack called WannaCry. It infected over 200,000 computers worldwide and locked numerous organizations out of their data, including hospitals in the United Kingdom. There are several reasons this attack gained so much attention. First, it spread rapidly from computer to computer by attacking a known weakness in Windows computers. Second, the attack was a type of malware called Ransomware, which meant that once it infected your computer it encrypted all your files, locking you out of your data. The only way you could recover your data was from backups or by paying the attacker a $300 ransom to decrypt all of your data. The third and most important reason this attack gained so much attention was because it never should have happened. The weakness was well known by Microsoft, which had released a fix months earlier. But many organizations failed to install the fix, or were still using operating systems that are no longer supported by Microsoft. Here are three simple steps you can take to make sure attacks like WannaCry never infect your computers:
Patching- First and foremost, make sure your computers, mobile devices, apps, and anything else connected to the Internet are up-to-date. Cyber criminals are constantly looking for new vulnerabilities in the software your devices use. They use special programs to exploit and hack into the devices you are using. Meanwhile, the companies that created the software are hard at work fixing these vulnerabilities by releasing updates. By dutifully installing these updates on your computers and mobile devices, you make it much harder for someone to hack you. That’s what was so frustrating about the spread of WannaCry: the updates to fix and stop the attack had been released almost two months earlier by Microsoft. Had organizations kept their computers up-to-date, the attack would never have worked. To ensure that your devices stay current, enable automatic updating whenever possible to almost any technology connected to a network. This includes Internet-connected TVs, home routers, and gaming consoles (and someday perhaps even your car).
Backups- In some cases, cyber attacks like Ransomware may even infect up-to-date systems. A second way to protect yourself is to back up your data. Backups are copies of your information stored somewhere other than on your computer or mobile device. When you lose valuable data, you can recover that data from your backups. Unfortunately, too many people fail to perform regular backups. There are two ways to back up your data: physical media or cloud-based storage. Each approach has advantages and disadvantages. Physical media is devices you control, such as external USB drives or network-connected drives located in your home or office. These enable you to backup and recover large amounts of data very fast. The disadvantage is that if you become infected with malware, such as Ransomware, it is possible for the infection to spread to your backups. If you are using physical media for backups, you should store copies of your backups off site in a secure location. Cloud-based solutions are online services that back up and store your files on the Internet. Typically, you install an application on your computer. The advantage of cloud-based solutions is their simplicity and infection cannot access cloud-based backups. The disadvantage is that it can take a long time to back up or recover very large amounts of data.
Phishing- Cyber criminals often use another attack method called phishing. Phishing is when cyber criminals send you an email that tries to trick you into opening an infected attachment or visiting a malicious website. If you do either, your computer may become infected. While WannaCry did not involve phishing, this attack method is commonly used for many other types of attacks, including most types of Ransomware. In addition, the cyber criminals who developed WannaCry will undoubtedly update their attack methods in the coming months and use new techniques, such as phishing, to infect even more computers. The key to protecting yourself against such email-based attacks is common sense. If an email or message seems odd, suspicious, or too good to be true, it is most likely an attack.
A Public Service Announcement Courtesy of Cedar Valley Bank & Trust

Staying Safe Online – April 5, 2017

Securely Using Mobile Apps
Mobile devices, such as tablets, smartphones, and watches, have become one of the primary technologies we use in both our personal and professional lives. However, with the power of all these mobile apps comes risks. Here are some steps you can take to securely use and make the most of your mobile apps.
The first step is making sure you always download mobile apps from a safe, trusted source. Cyber criminals have mastered their skills at creating and distributing infected mobile apps that appear to be legitimate. If you install one of these infected apps, criminals can take complete control of your mobile device. By downloading apps from only well-known, trusted sources, you reduce the chance of installing an infected app. What you may not realize is the brand of mobile device you use determines your options for downloading apps.
For Apple devices, such as an iPad or iPhone, only download mobile apps from the Apple App Store. The advantage to this is Apple does a security check of all mobile apps before they are made available. In addition, if Apple does find an app in its store that it believes is infected, it will quickly remove the mobile app. Windows Phone uses a similar approach to managing applications.
Android mobile devices are different. Android gives you more flexibility by being able to download a mobile app from anywhere on the internet. However, with this flexibility comes more responsibility. Google does maintain a managed mobile app store similar to Apple’s, called Google Play. The mobile apps you download from Google Play have passed some basic security checks. Avoid downloading Android mobile apps from otherwebsites, as anyone, including cyber criminals, can easily create and distribute malicious mobile apps and trick you into infecting your mobile device. As an additional protection, install antivirus on your mobile device when possible. The key to securely using mobile apps is to install apps only from trusted sources, to install updates when available, and to grant only the required app permissions.
Regardless of which device you are using, an additional step you can take is to avoid apps that are brand new, that few people have downloaded, or that have very few positive comments. The longer an app has been available, the more people that have used it, and the more positive comments it has, the more likely that app can be trusted. In addition, install only the apps you need and use. If you stop using an app, remove it from your mobile device. (You can always add it back later if you find you need it.)
Finally, never jailbreak or root your mobile device. This is the process of hacking into it and installing unapproved apps or changing existing, built-in functionality. This not only bypasses or eliminates many of the security controls built into your mobile device, but often also voids warranties and support contracts.
Once you have installed a mobile app from a trusted source, make sure it is safely configured and protecting your privacy. Always think before allowing a mobile app access: do you want to grant the app the permission it asks for, and does the app really need it?
Mobile apps, just like your computer and mobile device operating system, must be updated to stay current. Criminals are constantly searching for and finding weaknesses in apps. The more often you check for and install updates, the better. Most devices allow you to configure your system to update mobile apps automatically. We recommend this setting. If this is not possible, then we recommend you check at least every two weeks for updates. Finally, when your apps are updated, always make sure you verify any new permissions they might require.
A Public Service Announcement Courtesy of Cedar Valley Bank & Trust

Loading

Community Calendar

  • 2-Couple Best Shot, LPC Golf Club

    Saturday, August 19 2017 @ 9:00 AM - 10:00 AM

Member Login

Forgot Password?
Join Us

Shopping Cart

Your cart is empty
Visit The Shop
error:
X

Forgot Password?

Join Us

Password Reset
Please enter your e-mail address. You will receive a new password via e-mail.