now browsing by tag


A summer guide to dating while partially vaccinated | #speeddating | #tinder | #pof | #blackpeoplemeet | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

How far you go will depend on your comfort level – and open lines of communication Marie S/Unsplash While vaccination efforts are picking up speed across the province, Ontario’s timeline […]

The post A summer guide to dating while partially vaccinated | #speeddating | #tinder | #pof | #blackpeoplemeet | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

The pandemic guide to parenting a preteen | #parenting | #parenting | #parenting | #kids

When S Prashanti shifted base from Hyderabad to Visakhapatnam following a career move last month, the main challenge she faced were the insecurities of her two daughters, 12 and 14 […] View full post on National Cyber Security

#datingtips | Best Places To Meet Girls In Lausanne & Dating Guide | romancescams | #scams

If you are looking for the best places to meet girls in Lausanne with a dating guide then we can certainly help you out. Where to pick up single women […] View full post on National Cyber Security

A New Viewer’s Guide to Netflix’s ‘Dating Around’ Ahead of Season 2 – TV Insider | #tinder | #pof | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

Are you a a reality TV junkie looking for your next fix? It’s harder and harder to come by with staples like The Bachelorette and Bachelor in Paradise on hiatus with the ongoing coronavirus pandemic, but fear not because Netflix has you covered.

Season 2 of their addictive romantic reality title Dating Around arrives June 12 on the streaming platform. Below, we’re breaking down all the details newcomers need to know before diving into this bingeable fare.

The Premise

Each episode of this series follows one single person looking for love as they go on five different blind dates. Exploring the awkward, sweet and flirty banter common in a first date setting, Dating Around asks the question, who will get a second date? In Season 2 of the program, singles based out of New Orleans will be followed.


Dating Around Season 2

(Credit: Netflix)

Stepping up its game from network dating shows, this series examines all kinds of relationships and orientations ranging from heterosexual and bisexual to same-sex couples. Dating Around is a more diverse alternative in comparison to shows like The Bachelorette or Bachelor which have recently come under fire for its lack of inclusion.


Netflix is offering a glimpse at what’s to come in a newly released trailer which hints at some interesting situations including an awkward reunion between former Tinder matches.

Extra Viewing

If you didn’t tune in for Season 1, there are six episodes currently available for streaming on Netflix. Each installment is roughly a half-hour in length and follows six singles on their quest to find the one for them. Season 1 includes Luke, Gurki, Lex, Leonard, Sarah and Mila, but don’t expect anything beyond their blind dates as Season 1 didn’t include a reunion special like the platform’s other buzzy shows Too Hot to Handle and Love Is Blind.

Dating Around, Season 2 Premiere, Friday, June 12, Netflix

Source link

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post A New Viewer’s Guide to Netflix’s ‘Dating Around’ Ahead of Season 2 – TV Insider | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | A Quick Guide to SD-WAN Security

Source: National Cyber Security – Produced By Gregory Evans

Today, nearly every IT decision-maker wants to invest in innovation that will facilitate network performance and agility without compromising security. For many, the answer is SD-WAN. The intersection between security and SD-WAN is critical in keeping data not only accessible but also safe. Here’s a quick guide to the security benefits and precautions for SD-WAN.

SD-WAN Security: Need-to-Know Basics

The Security of SD-WAN Appliances

SD-WAN hardware is essentially a small computer, which means that the devices themselves are not necessarily built to be secure. In many cases, these devices may not have the most up-to-date operating system when it is shipped to the customer location, so checking for appliance security updates is critical.

  • Hardware: Off-the-shelf box servers and microservices should come only from well-known vendors with tested products.
  • Patches and Security Updates: Make sure your appliance is automatically updated by the service provider, or, at the very minimum, there is a process in place to do so.

SD-WAN’s Bundled Security Features: Benefits and Challenges

Because SD-WAN secures traffic in transit, deploying solutions that include integrated firewalls and associated unified threat management have an advantage over solutions that require separate threat management. Properly configured SD-WAN devices can simplify security and defend data from attackers.

However, these bundled solutions can sometimes trigger challenges, blurring the line between network and security operations. Adding an unmanaged (and possibly unsecured) SD-WAN appliance to a corporate network can make roles and responsibilities confusing. Tight alignment is critical to help network teams address questions such as, “Does that mean our internal IT security team is responsible for managing the SD-WAN devices on our corporate network?” The worst-case scenario: The network team assumes the security team knows about the SD-WAN deployment and will take care of it. Then, critical security monitoring tasks are disregarded.

Overlooked Benefits: Segmentation & Zero Trust

Often overshadowed by other benefits, increased security is another advantage to come from SD-WAN. Built on flexible, software-defined architectural models, SD-WAN facilitates the normally difficult task of WAN segmentation, helping businesses deal with issues such as security threats from within. Segmentation is key due to the dramatic uptick of threats from inside a network, and it’s a focal point for many zero-trust security strategies.

SD-WAN makes segmentation and implementing zero-trust processes far easier, but it’s also playing a key role in first-line-of-defense capabilities. Approaches include SD-WAN solutions that whitelist online applications and websites for branch offices that may not have local firewalls.

SD-WAN and Internet: Security Risks and Resource Impacts

Given that SD-WAN paves the way for enterprises and their branch locations to leverage the internet for connectivity, security must be at the top of the priority list. When SD-WAN is deployed over dedicated internet connectivity or public broadband, it can introduce security risks that require next-generation firewalls, threat monitoring and management. Therefore, bundling security into SD-WAN isn’t just an option—it’s a requirement.

Here’s a quick background: Closely monitored firewalls are key defense mechanisms when SD-WAN shifts the network architecture away from a small set of centrally managed internet gateways and toward a highly distributed set of gateways. Because this dispersed architecture inherently increases the attack surface, the next move of any savvy network engineer is to implement next-generation firewalls with unified threat management. Built-in features make this step seamless.

SD-WAN Security: Must-Have Features and Capabilities

Your enterprise must be prepared to defend against any increased vulnerabilities, including leveraging:

  • A single on-premises or virtual client device that can handily and cost-effectively serve multiple security functions, including embedded firewalls for secure internet offloads and automatically encrypted tunneling to secure data across the internet.
  • The ability to centrally drive policies and configurations to reduce complexity and ease of security management–for example, centralized orchestration is a path to chaining WAN security services such as firewalls and routers across locations around the globe.
  • The ability for SD-WAN network performance monitoring as well as security monitoring to sort through alerts generated by SD-WAN firewalls.

It’s not uncommon for CIOs and CISOs to feel overwhelmed at this point. SD-WAN implementation and management can tax IT resources. This is where managed SD-WAN, 24-7 security monitoring services, and managed detection and response solutions can help take the workload off your internal team. Service-based approaches are more scalable from both a resource and budgetary standpoint.

Secure SD-WAN: A Quick Buyer’s Guide

Looking to buy secure SD-WAN? Ask these three questions before you buy:

  1. Does your SD-WAN solution include an integrated, next-generation firewall with unified threat management (UTM)?
  2. Do you offer secure local internet breakouts, and if so, how?
  3. Does your SD-WAN include an integrated router and firewall, to direct and secure route traffic to the internet easily without stacking multiple devices at a given location?

Don’t forget about analytics. Buyers also take a hard look at security analytics, which is sometimes just bolted on as aftermarket components rather than being deep-seated into the SD-WAN solution. Within the online portal, most providers will give you visibility at the box-level onsite, but not at the network level itself. However, partners with security and analytics tools integrated into the solution (truly embedded into the fabric of the software-defined network platform) offer the ability to view data from the actual network ports inside the SD-WAN portal. These are key differentiators for those seeking full transparency and the deepest levels of insight.

Source link

The post #cybersecurity | #hackerspace |<p> A Quick Guide to SD-WAN Security <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | A Guide to Everything You Need to Know About Dark Data

Source: National Cyber Security – Produced By Gregory Evans We are living in a world where data is a currency, offering businesses leverage in the market. Hence data ought to be treated as a resource that needs to be exploited to the maximum potential. Normally, companies make use of structured data to collect information. However, […] View full post on

#cybersecurity | #hackerspace | Active Directory Fix-It Guide – Security Boulevard

Source: National Cyber Security – Produced By Gregory Evans IT admins have long been the unofficial repair technicians of the enterprise. However, instead of hammers and wrenches, the tool kit of the IT admin contains servers, cables, and software tools. Unfortunately, one of the most popular IT admin tools, Microsoft® Active Directory® (AD), isn’t working […] View full post on

#nationalcybersecuritymonth | The Technophobe’s Guide to Cybersecurity

Source: National Cyber Security – Produced By Gregory Evans


This article was first published on

Having your data exposed in a breach feels inevitable, so securing your information online is a must. But with terms like VPN, SSO and HTTPS being bandied about, it’s hard to know where to start.

It’s true, there are many, many steps you could take to improve your security — some involving acronyms — but experts say a few basics will help a lot.

“It can seem overwhelming, but it’s really not,” says Kelvin Coleman, executive director of the National Cyber Security Alliance. “Low-hanging fruit can be very, very effective in keeping you safe.”

These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.

1. Update your devices

“Security software is quite effective against known malware,” says Curtis Dukes, executive vice president of the Center for Internet Security. That’s because engineers are constantly creating new versions in response to current threats.

Your computer and mobile devices likely have security software built into their operating systems, and they should notify you of updates automatically. The pop-ups might feel intrusive, but they’re there to protect you.

So you should resist the urge to delay updates. “I wish I could lobby to have that ‘or later’ button deleted,” Coleman says.

2. Use secure passwords (and helpful password services)

“Unfortunately, a significant number of people still use 123456 and password1,” as well as other easy-to-guess login credentials, Coleman says. If you reuse the same password, it’s easy for criminals who’ve hacked one of your accounts to access others.

If you’re not interested in designing and remembering complicated passwords for all of your approximately 500 online accounts, Dukes recommends a password manager — consider 1Password or LastPass — that can suggest and store them for you.

Erin Shepley, Cybersecurity Awareness Month Lead for the Department of Homeland Security, also suggests using multifactor authentication on your most important accounts, such as your email and bank logins. This process requires you to approve a sign-in on a separate device — such as your phone — making it easier to detect and foil unauthorized logins. If your account offers it, the option is typically available under security settings. (Google calls it “two-step verification.”)

“If it takes more time for the malicious actor, they’ll move on to someone who doesn’t have that in place,” Shepley says.

3. Be wary of public Wi-Fi

You’ve heard it before, but “public wireless ‘hotspots’ are just that, public,” Dukes says. Information you transmit on them — including credit card data or logins — can be intercepted by a hacker on the same network. Networks without passwords, such as the ones you’ll find at some airports or hotels, are especially risky.

Not only that, but criminals might spoof a legitimate access point. It’s always smart to confirm you have the correct network name before you use it, according to the DHS.

If you really must do sensitive tasks — such as shopping or checking your bank balance — outside of your home network, using your own personal hotspot is safer than public Wi-Fi. And always make sure the URLs you’re using for these tasks begin with “https://,” Shepley says.

4. Don’t fall for phishing scams

It’s not new, but criminals still do it because it works: They contact you, claiming to be someone — maybe someone you know — who needs your financial data, Social Security number or other personal information. They can then use this data to access your accounts.

“Phishing is still the threat vector of choice,” Shepley says. “They prey upon the human nature in people.”

It’s not always easy to tell a legitimate message from a scam, but if you’re being asked for money, login credentials or other personal data, you should verify the message before responding. For example, if you receive an email purporting to be from your bank, the DHS recommends calling your bank for confirmation on a phone number you’ve Googled; don’t click any links within the suspicious email.

Safety doesn’t have to be complicated

Once you’ve mastered these steps, you can absolutely take further action to lock down your online presence. You might even be inspired to set up a VPN, or virtual private network, a service that can create a secure connection on a public network.

But the good news is that simple changes — like using unique passwords — can go far in keeping you safe online. “It won’t save you every time. But … it’s better to have it than not have it,” Coleman says.

Source link

The post #nationalcybersecuritymonth | The Technophobe’s Guide to Cybersecurity appeared first on National Cyber Security.

View full post on National Cyber Security

Council Post: Cyber Security For Startups: A Step-By-Step Guide

Source: National Cyber Security – Produced By Gregory Evans

2019 has been a total disaster regarding security considerations. According to a report published by Risk Based Security (via Forbes), there were more than 3,800 reported breaches during the first half of the year, and three of them made it to the 10 largest of all time.

Data leaks are as common now as the vagaries of the weather. Withstanding such a storm is a tough challenge, especially for young companies that are too short of money to build a strong defense against digital villainy.

It’s possible, though. Here is the security guide based on the experience of the startup I work with, focusing on the options that will go at each maturity stage and won’t conflict with the future add-ins.

Nothing To MVP

You’re probably not sure yet if your business is going to raise any investments. In my opinion, your best choices are cheap or free.

• Application security: From my experience, hashing the user’s credentials is essential here. Also, you might not want to store credit card information for now. It’s in the scope of PCI compliance, a set of regulations too hard to chew with limited money.

• Infrastructure security: You should exploit managed services like Google Cloud, Microsoft Azure or Amazon Web Services and configure them properly. Use separate accounts for production and other environments, enclose everything in a virtual private cloud (VPC) and limit the number of IPs that can access the environment.

Other great steps are to move your production configurations out of the code and into a separate repository and enforce multifactor authentication (MFA) on all services that engineers work with.

Also, don’t forget to restrict access to the production server and database, organizing everything through Continuous Integration tools like Jenkins or TeamCity.

• People security: Hire a reliable development and operations engineer to be sure that sensitive accesses are in good hands. Running secure coding training for your engineers will also be beneficial, as one day of their time can save your company. Additionally, a measure as simple as encrypting their laptops and providing them with antivirus software can be a life-saver if some of the gadgets get lost in a coffee shop.

MVP To Seed

You’re still short of funding but already have customers and want to secure their data properly. I believe you should keep focusing on less expensive but impactful measures.

• Application security: You should enforce a password policy for your users and run at least one penetration test, which could help you uncover hidden security breaches. Another good practice is to maintain the OWASP Top 10 status of your app. It’s a regularly updated report on concerns for web security.

• Infrastructure security: Back up your databases, encrypt data in transit and make critical resources only available through the private VPN. These steps are simple but can save the company.

• People security: Your goal here should be to set up basic onboarding and offboarding procedures. You’ll want to revoke all the access to sensitive data when people leave your stronghold. Enforcing password management policy would be useful as well.

Another good step is running engineering-oriented security awareness training. In critical circumstances, everyone should know what to do by heart.

Seed To Series A

You are in an active development phase, might have some money and could have up to 15 engineers in the house. From my experience, this is an excellent time to establish security policies and procedures without losing flexibility.

• Application security: Running application penetration tests should be a habit at this point, but don’t hesitate to change your test vendors sometimes. It will give you fresh eyes on your safekeepings. Also, you should encourage your engineers to follow the Secure Development Lifecycle. From now on, security is at the front and the center of your company.

• Infrastructure security: You might want to become a bit paranoid at this stage since your company could start attracting predators’ attention, so stop sharing any accounts. Everyone accessing the resource should have their own account with the minimally acceptable permissions. You’ll also want to run an infrastructure penetration test regularly and make a disaster recovery procedure. It’s vital to have a plan if something goes south.

Additionally, you’d want to know about any unauthorized attempt to access your servers. A host-based intrusion detection system should help you with that, while a vulnerability scanner should reveal weaknesses in your servers and remind you to keep their software up to date.

• People security: It’s time to get your team through a series of drills. Make an incident response policy and perform a few exercises by simulating an “end of the world” scenario. In addition, run a risk assessment exercise and carry out the company-wide security awareness program. Your nontechnical employees should know what “phishing email” means.

You’ll also want to control every workstation in your company and ensure they have antiviruses, the latest security updates, screen locking timeouts and so on. Any mobile device management software will be of help.

Post-Series A

You have a large staff and hordes of happy customers. Hence, you’ve become a tidbit for cybercriminals. I believe there is no better time for serious reinforcements.

• Application security: In my opinion, running a bug bounty program is a must-have here. White-hat hackers are the best at finding vulnerabilities in the software — except for regular hackers, of course. To detect the actual malicious activity in time, use any good application performance monitoring tool. You can also enforce the application change management procedure. Any change in your production systems and infrastructure should get extra approval from one more person.

• Infrastructure security: Use a security information and event management tool. Configure it to receive all security notifications from your servers, vulnerability scanners, intrusion detection systems and so on.

People security: It would be beneficial to hire an IT team and arm it with the security event monitoring tool in order to manage and control all of your employees’ workstations.

Finally, use centralized account management for providing and revoking system access during onboarding and offboarding.

The modern age provides you with plenty of means to protect your business, and many of them require no more investments than your time. The only hitch is to apply them at the right moment.

You can never be immune to all kinds of hazards, but minimizing their chances of knocking you out is within your reach.

Source link

The post Council Post: Cyber Security For Startups: A Step-By-Step Guide appeared first on National Cyber Security.

View full post on National Cyber Security

A Student’s #Guide on How to Help #Protect Against #Identity Theft

Source: National Cyber Security – Produced By Gregory Evans

A Student’s #Guide on How to Help #Protect Against #Identity Theft

Your college career is supposed to be about finding yourself and forging your identity—not having it stolen. But, in the United States, over 15 million consumers experienced identity fraud in 2016.

There’s a new victim of identity fraud every two seconds, according to the 2017 Fraud Study from Javelin Strategy & Research. Many of those victims could be college students.

The risk you face? A thief who steals your identity can commit crimes in your name or prevent you from getting that coveted job after graduation.

It’s smart to take steps to learn how to help protect yourself against identity theft. This guide can help. Think of it as “How to Help Protect Against Identity Theft 101.”

An identity-theft definition
What is identity theft? Identity theft occurs when someone steals your personal information — such as your name, address, Social Security number, date of birth, and more — and commits fraud in your name.

Criminals may use your personal data to take over your bank account or open new credit cards and run up debt, all while pretending to be you. They might file fake tax returns, buy or rent property, or commit a host of other crimes using your information.

As a college student, you have plenty to do without having to worry about identity theft. But, like a looming final exam, identity theft isn’t going away. Learning how to help protect yourself—and your financial future—is fast becoming a required course.

What’s in ‘A Student’s Guide’
Here’s what you’ll find in this guide:

Facts about identity theft
How students can help protect their identity
How identity theft happens—from low-tech to high-tech techniques
We’ve also included two additional sections:

A Teacher’s Guide on How to Help Protect Against Identity Theft
A Campus Police Officer’s Guide on How to Help Protect Against Identity Theft
Facts about identity theft
Here are two things you should know about identity theft: It’s big and it can affect your future.

How big? Consider these statistics:

In 2016, over 100 million hours were spent by identity fraud victims trying to resolve their issue, according to a 2017 Fraud Study from Javelin Strategy & Research.
22 percent of students found out they had been a victim of identity fraud after being denied credit or contacted by a debt collector, according to a 2015 Identity Fraud Study, released by Javelin Strategy & Research. Also, the study found students were three times more likely to be victims of identity-theft fraud than the general population.
Identity theft and your future
As for your future, you came to college to prepare for it. But if you become a victim of identity theft, you could spend hours, days, or more dealing with the mess. You also may face obstacles to starting a career and becoming financially independent.

That’s because when an identity thief commits fraud in your name, it can become part of your record. Your financial history—including an identity thief’s bogus dealings—will likely appear in your credit file. Credit bureaus store that data, and a credit file showing financial misdeeds can lead to a low credit score. A low credit score can make it hard to qualify for a variety of financial products and certain life necessities.

Lenders and other businesses typically check your credit report before deciding whether to lend you money or make other big decisions involving your future. Here are a few ways a damaged credit file can hurt you.

You may have a hard time getting approved for a credit card or loan.
You may not get a job offer from a potential employer.
You could have trouble renting an apartment.
You may be unable to get a cell phone account.
No one can prevent all identity theft. But you can take steps to help minimize the risk, and those start will helping to protect your personal information.

How students can help protect their identity
As a college student, you probably have personal information in a lot of places — in your computer, cell phone, academic file, wallet, even on the top of your desk. The goal is to protect this information.

Here’s how to help protect against identity theft from happening:

Guard your numbers. You have a lot of them — credit and debit card numbers, driver’s license number, PINs. Your Social Security number is your most valuable identifier and one of the most prized by identity thieves. Share these numbers only when absolutely necessary, and only when there’s a legitimate reason to provide them. It’s a good idea to memorize your important numbers and never leave them in plain view of someone else.

Avoid public Wi-Fi. Public Wi-Fi networks are not secure. That means that when you go to a café to do work on your computer, someone can intercept what you’re looking at on the web. That might include your email, browsing history and passwords. Your defense? It’s always smart to use a virtual private network. A VPN creates an encrypted connection between your computer and the VPN server. As a result, a nearby hacker can’t intercept your information. If you’re tempted to perform a financial transaction—like, buying something on the web—a VPN is essential.

Beware of shoulder surfing. Always be aware of your surroundings. Take time to make sure someone isn’t glancing over your shoulder while you enter your PIN number at an ATM or key in personal information into your cell phone. Think twice about providing a credit card number over the phone if someone is within listening distance.

Don’t overshare. Identity thieves often seek to bundle your personal information. What you post on social networks can be a rich source of information. Identity thieves can glean details from your life that could help answer security questions on websites—like, “Where were your born?” or “What’s your favorite food?”

Keep personal information in a safe place. It’s easy to leave a credit card or driver’s license lying on your desk. But colleges are social places. It’s hard to predict who might pass through your living space and potentially steal the information on those cards. It could be a friend, or a friend of a friend, or an out-of-town guest of your roommate.

Shred documents that contain personal information. A paper shredder may not have the same college appeal as, say, a refrigerator in your room. But it’s essential for shredding papers that include your personal information. For instance, you probably receive credit card offers in the mail. Don’t just toss them in the trash, where someone could retrieve them. Shred them right away.

Protect your computer from malware. Malware—short for malicious software—includes computer viruses and spyware. It can get installed on your computer or mobile device and you might not realize it. Identity thieves use malware to steal personal information and commit fraud. What to do? Install security software from a reputable company. It’s also essential to keep all your software programs up to date. Another precaution: Back up your information in case a hacker corrupts your computer.

Get savvy about online scams. Identity thieves may try to trick you into clicking on links that install malware on your computer. Or they might set up fake websites offering amazing “deals” to lure you into providing your credit card information. Stick with reputable websites. Never click on a link or an attachment from someone you don’t know.

Keep track of your credit history. The federal Fair Credit Reporting Act allows you to get a free credit report from each of the three major credit bureaus annually. This is where you can look to see if anyone has opened an account in your name. If you see something suspicious, you can take appropriate actions. You can get your free reports at

Use strong passwords on all your devices. A strong password includes letters, numbers and symbols. It’s a good idea to have separate passwords for all your devices, including computer, tablet, and cellphone. Never share your password with someone else. And remember to change it periodically. Or consider using a reputable password manager. A passport manager is a software application with strong security features that manages and stores your passwords.

Mind your bank cards. Notify your bank or credit card company if you misplace your credit or ATM card. They’ll likely cancel your card and send you a replacement with a new number. Usually they will review recent transactions with you to identify any suspicious activity. As a general rule, check your bank and credit card statements regularly to make sure all activity is legitimate.

A Teacher’s Guide to How to Help Protect Against Identity Theft
As a teacher, you could have the opportunity to help protect students from identity theft.

It’s a good idea to familiarize yourself with the information in A Student’s Guide on How to Help Protect Against Identity Theft. It will help you understand how identity theft happens in college. And you can help guide students in how to minimize the risk.

A Teacher’s Guide includes a list of resources that you can share with your students to help them keep their identities safe.

Here’s a checklist of ways you can help.

Encourage students to practice smart online habits. Let students know, for instance, that not all networks on campus may be secure. If your course requires purchasing materials online, remind students to use a secure network or virtual private network (VPN). Discuss the risk of sharing personal information when students work collaboratively on projects.
Help keep your students’ numbers safe. It’s a good idea never to use a student’s Social Security number as official identifier in coursework or assignments. A student’s Social Security number is a key piece of information for identity thieves.
If appropriate, let students know there are key ways to help protect their identity. These range from checking their credit reports for suspicious accounts to never using a library or public computer to provide personal information.
Find out if your college offers any presentations or workshops on identity-theft protection. Keep a list of available resources handy.
Remind students to lock their computers and protect them with strong passwords. In general, students should never leave their computer where someone can snoop for personal information or steal it.
Point students to resources that can help provide additional information related to identity theft. Here are a few good ones:
U.S. Department of Education: Offers identity-theft prevention tips and materials.
U.S. Federal Trade Commission: Includes prevention and recovery tips. Also offers free publications in bulk.
Identity Theft Resource Center: Includes tips for students and parents.
Finally, it’s important to remind students that protecting their identities is important to their college career and future. Your identity is one of your most important assets.
A Campus Police Officer’s Guide on How to Help Protect Against Identity Theft
As a college law enforcement official, you know that your job is to keep the campus safe and secure. Helping students protect themselves against identity theft may be a crucial part of that.

Here’s a check list of things you might do:

Be familiar with A Student’s Guide to Help Protect Against Identity Theft. It will help you understand how identity theft happens in college, and how you can help students minimize the risk.
Encourage safe practices: Consider reminding students that campus theft often involves the loss of personal information—whether it involves a wallet, computer or personal documents.
Consider a policy for protecting lost devices, such as computers and cellphones that have been turned in to the campus police department. Establish a protocol for making sure the devices get back to their rightful owners.
Become an active partner in protecting against identity theft. Develop and distribute materials about what students can do avoid identity theft.
Encourage students to lock their dorm rooms or apartments when they’re away.
Point student to resources that can help provide additional information related to identity theft. Here are three good ones:
U.S. Department of Education: Offers identity-theft prevention tips and materials.
U.S. Federal Trade Commission: Includes prevention and recovery tips and facts about identity theft. Also offers free publications in bulk.
Identity Theft Resource Center: Includes tips for students and parents.

The post A Student’s #Guide on How to Help #Protect Against #Identity Theft appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures