PASSWORDS:
Passwords should be complex: Minimum 8 characters with at least 1 number and 1 capital letter. Example: 1Camaro2
Better is if there is a special character such as #, !, *, $ is used too. Also, use more than 8 characters. Example: !Chev1Camaro2#
Best password is if it is random or use a phrase and replace some letters with another character. Example: Replace a with @, e with 3, o with 0, S with $, etc.. Example: !Acd5#43Bsg67%!
Do not use: numbers from social security number, drivers license, birthdays, address. Anything that might help a hacker determine what your password is or facilitate identity theft.
FILE STORAGE:
Computer Labs:
Save files to a jump drive or a network folder. The network folder can be created by the Tech. Coordinator and mapped to your computer. Also, permissions/restrictions can be configured on the folder.
Do not save to the default documents folder or desktop because if the login profile becomes corrupted, that data may not be recoverable.
EMAIL SECURITY:
Follow this EMAIL SAFETY CHECKLIST to know if it IS or is NOT safe to open an email. Overall rule is if you do not know or are not sure where it came from, then delete it. IS THIS EMAIL/ATTACHMENT OK TO OPEN
1. Is the email from someone you don’t know or recognize YES / NO
1. IF YES, DELETE DELETE DELETE
2. IF NO, GOTO Next step.
2. Is the email talking about something that DOES NOT fully relate to you or your position YES / NO
1. IF YES, DELETE DELETE DELETE
2. IF NO, GOTO Next step.
3. Does the email have an attached file that IS a Word (.docx) or Adobe (.pdf) YES / NO
1. IF NO, DELETE DELETE DELETE
2. IF YES, MAKE SURE YOU ANSWERED NO to #1 and #2 ABOVE before you open the file
4. If the file attached or downloaded is a .zip file and you opened the zip attachment, does it have a .js, .bat, .exe YES / NO
1. IF YES, DELETE DELETE DELETE
2. IF NO, CAN YOU ANSWER NO TO #1 and #2, IF YOU CAN, THEN GOTO next step.
5. The zip file is probably safe to open and only open
1. (IF YOU ARE UNSURE, ask for help or just delete it. If you do not know who sent the zip file or you were not expecting it, then delete it.
Cybersecurity Awareness Document
Below is a good security awareness training document.