This spring break, students and families will step away from school and travel to warmer locales.
Before you jet to your spring break destination, don’t forget to pack your passport, sunscreen, and these mobile safety tips from Stop.Think.Connect.:
Keep a Clean Machine. Ensure all devices that connect to the Internet, including smart phones, tablets, and laptops, have the latest mobile security software, web browsers, and operating systems. This is the best way to defend against viruses, malware, and other online threats.
Protect Your Personal Information.Keep your phone securely locked (with a passcode) and in your possession. Disable geotagging features on your phone and applications so that your movements are not tracked and broadcast. Only give your phone number to people you know, and don’t share your friends’ numbers without their permission.
Connect with Care. While conducting online banking or shopping, look for websites that begin with “https.” These sites have taken extra measures to secure your information. Also, be wary of using public Wi-Fi or Internet hotspots to conduct sensitive online activities, such as banking and shopping.
Be a Good Online Citizen. Think before you upload photos or videos. What you put online can have consequences in the future. Ask your friends’ permission before uploading photos of them as well.
For more cybersecurity tips for those on the go, download the Stop.Think.Connect. Mobile Safety Tip Sheet.This information was published by GovDelivery on behalf of the US Department of Homeland Security in a March 2014 newsletter email.
Common online fraud scams include:
- People selling items, such as automobiles, that they do not own. These transactions can take place over sites like Craigslist or eBay, with the buyer transferring money electronically and receiving no product in return.
- Phishing and spoofing, where criminals pretend to represent a legitimate company or agency and request personal information from their targets. These attempts can include a legitimate-looking email or website. In these cases, the criminals have “spoofed” a real company’s site.
- Nigerian letter scam, where people are offered to share in a large sum of money if they can help place this money in overseas bank accounts. Victims give criminals their bank account information and send money to the criminals to help pay for bribes and taxes with the promise of repayment.
- Think Before You Act. Be wary of “too good to be true” deals. Free money, cheap iPads, cheap cars – if a deal sounds too good to be true, then it probably is.
- When in Doubt, Throw it Out. Do not click on links or emails that seem suspicious or are from unknown, unsolicited sources.
- Shop Only at Reputable Online Retailers. Look for the padlock symbol or for URLs that start with “https” or “shttp.” For auction sites such as eBay, check the seller’s reviews.
- Use Safe Payment Options. Use a credit card if possible. Credit cards have higher protection measures than debit cards. If you do become a victim of fraud, credit cards offer a better chance that you will not be liable for fraudulent charges.
- only allowing employees to connect devices with a certain mobile operating system to the corporate network
- not permitting workers to use jailbroken or rooted phones
- prohibiting users from changing the SIM cards in their phones and tablets
- banning specific tools and services, such as cloud vendors and MiFi hotspots
- enforcing certain levels of encryption that let EMM tools hook into users’ devices
How and why do employees circumvent IT policies?Admins often give users who violate policies the benefit of the doubt because employees don’t always break the rules for malicious or vindictive reasons. Rather, workers may not even know that certain actions break a company policy. That being said, thousands of breaches occur daily, and they can cost companies millions of dollars. Breaches can occur when employees store company information in third-party cloud services or when they use a blacklisted app, jailbroken phone or other device that does not meet the company guidelines. Employees who violate policies usually do so to be more productive. For example, many companies require workers to “remote-in” to access files from a mobile device. An employee may find it easier to store those files in a personal Dropbox account and then access them from anywhere, even though that action may violate a corporate policy. Additionally, restrictions on device model and OS version can cause strife for employees who may buy a personal device based on price. If the device they choose falls below the standards that the IT department set, that employee only has a few options: get no work done, upgrade his phone to gain access to the tools he needs, or go around IT blocks.
What should IT admins do?Today’s users are smart, and they will do what they need to so they can get work done, but there are steps you can take to combat employees circumventing IT policies. Create policies based on employees. Interview users to learn how they work, find out which devices and apps they like and then form policies around that research. When the guidelines for devices, services and applications mirror the way people really work, they won’t need to go around restrictions. For example, whitelist a note-taking app that you are comfortable with supporting, rather than blacklisting all note-taking apps. You’ll only have to manage one app, and employees can still get work done. Educate users. You might find that some employees are still new to smartphones and tablets. Education is key for these employees, and it doesn’t hurt to refresh the memories of seasoned mobile device users. Make sure workers know how to get the most out their devices, teach them about the risks of exposing company data and explain why your company’s policies are in place. Focus on data, not devices. Although you may need to create specific device guidelines so you can continue to use your EMM tools on all the devices that access your network, it’s more important to keep data safe. Operating systems change and update frequently, and it can be difficult to keep up.
This is a reprint from an article first published in February 2014 by Matt Schulz on SearchConsumerization.com
- Did all our backups complete successfully every night?
- Did we verify that the data reached the destination site via the link?
- Do we have the latest data available and not something that is hours or days old?
- Have we tested our data to ensure validity?
- Did we test enough to be comfortable that the data is valid?
- Water had seeped through the ceiling onto the Storage Arrays , AIX Servers and Mainframe in the Computer Room
- Water had risen to ankle deep depths under the floor where all the cabling and power drops were situated
- The fiber link between the Main Campus and the DR site was down
- Power to building was non existent
- The need to quickly re-establish a 2nd copy of the Company Data for DR and Business Continuity Purposes
- Identifying a new location of equipment to replace the damaged DR Site equipment
- Developing procedures for the removal and disk eradication of damaged equipment
- The need to identify and set up a new DR site
- The importance to assess and minimize the financial impact
- Don’t have your second Data Center in the same town as your Primary Site
- Vendors will help in the moment of need – it’s critical that you build and maintain a good relationship with them
- Your staff members will accomplish great things when needed and will amaze you as they work together to achieve a common goal
- Don’t Panic!
- Test your ‘data’ at least annually to ensure validity.
- Family is extremely important during ’emergency’ times – they are truly your ‘Support Structure’