Ditto.

Sean Rector, MCSE

-----Original Message-----
From: John Aldrich [mailto:[email protected]] 
Sent: Wednesday, May 25, 2011 1:47 PM
To: NT System Admin Issues
Subject: RE: Email I just sent to users re: cyber security

Thanks. I swiped it and tweaked it for our company. :D



From: Jonathan Link [mailto:[email protected]]
Sent: Wednesday, May 25, 2011 1:35 PM
To: NT System Admin Issues
Subject: Email I just sent to users re: cyber security

FYI, in case you don't want to reinvent the wheel, and you haven't rolled the 
wheel yet.
I had a couple of unrelated but eye-opening events that caused me to have to 
send this email.  Nothing major, but some poor behavior needed to be rectified.
 
Some of you may have heard about Sony's recent troubles with hackers getting 
into the PlayStation and Online Entertainment networks.  If you haven't been 
following the story, you may not be aware that other Sony services are also 
experiencing breaches.   I expect Sony to have difficulty for some time.  If 
you have any Sony account ID's (they also own BMG Music) you need to be extra 
vigilant.
 
It's a good time to point out some things you should be doing or need to know.
1.       Don't recycle passwords, use different, complex passwords on every 
site, at least as complex as the site will allow.  Doing this is the #1 item to 
protect yourself.
2.       Use a password management app that allows you to securely manage an 
ever growing list of passwords.  Smart phone users have a large array of 
choices, many of them free.  See your Appstore, marketplace, etc.
3.       If a site has access to a credit card #, as the Sony sites do, keep a 
watchful eye on that card.  There have been some reports of fraudulent charges 
and phishing scams breaking out to get the Security Code from the back of 
credit cards.
4.       If an email comes to you asking for login information, or other 
personal information, you should contact the company that is supposedly 
represented by the email, or just ignore it, because it's 99% probable that it 
is a phishing attempt.
a.       Do not automatically click on links within the email.  Hover over the 
links, if it takes you to some place that doesn't look correct it probably 
isn't.
b.      For example you bank with Chase, emails should be from 
[email protected] or sent on behalf of [email protected].  Website links should 
have chase.com before any page links, example www.chase.com/default.aspx would 
be a good valid page www is a computer at the chase.com internet domain 
default.aspx is the name of a specific web page.  
www.chase.com.differentdomain.info/changepssword.aspx is actually an address 
not going to a Chase owned website.  In this example www.chase.com is actually 
a specific computer at the internet domain diferentdomain.info. The clue is 
working from right to left from the slash, separating the website address from 
the page selection.  All internet domains are denoted by the two words, 
separated by a period immediately to the left of the / character.
5.       Wherever possible make sure that a site that  you to login is using 
https:// as the beginning of the address in the address bar.  The "s"
denotes secure and the channel between you and the website has been encrypted.  
If it isn't encrypted anyone else on that WiFi hotspot is able to listen to the 
traffic and could easily acquire your username and password code.
a.       Also be wary of sites that have problems with a website security 
certificate.  For example, our sites for external access to email and the vpn 
do have a problem with our security certificate, because we use a self-signed 
one for private use.  It's ok to do that, in this instance, because it is for 
private use, not public use.  Public use should be using certificates signed by 
a certificate authority, and wouldn't create the same warnings.  
 
As we put more of ourselves online with social networks, Facebook and LinkedIn 
being the two most prominent,  it is important to follow some of these basic 
security practices.  The more information out there, the more carefully crafted 
phishing attempts we will see.  #1 defense is to use complex and different 
passwords at every site you have login credentials.
#2 is to not respond to email purporting to come from a trusted authority 
asking for personal identifying information.
 
~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Information Technology Manager
Virginia Opera Association 
E-Mail:       [email protected]
Phone:        (757) 213-4548 (direct line)
{+}
On Sale NOW 2011-2012 Subscriptions featuring four NEW Productions
Aida | Hansel And Gretel | Orphée | The Mikado
Visit us online at www.VaOpera.org or call 1-866-OPERA-VA

The vision of Virginia Opera is to enrich lives through the powerful 
integration of music, voice and human drama.

This e-mail and any attached files are confidential and intended solely for the 
intended recipient(s). Unless otherwise specified, persons unnamed as 
recipients may not read, distribute, copy or alter this e-mail. Any views or 
opinions expressed in this e-mail belong to the author and may not necessarily 
represent those of Virginia Opera. Although precautions have been taken to 
ensure no viruses are present, Virginia Opera cannot accept responsibility for 
any loss or damage that may arise from the use of this e-mail or attachments.
{*}

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to