Students https://ociso.ucla.edu/ en Cybersecurity for Students https://ociso.ucla.edu/cybersecurity-you/students <span class="field field--name-title field--type-string field--label-hidden">Cybersecurity for Students</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/11" typeof="schema:Person" property="schema:name" datatype="">vtrullinger@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">April 15, 2021</span> <div class="layout layout__title-block"> <div class="block block-system block-system-breadcrumb-block panel"> <ul class="breadcrumb"> <li class="breadcrumb__item breadcrumb__item--first"> <a href="/">Home</a> </li> <li class="breadcrumb__item"> <a href="/tags/students">Students</a> </li> </ul> </div> <div class="block block-core block-page-title-block panel"> </div> </div> <div class="layout layout--twocol-section layout--twocol-section--33-67"> <div class="layout__region layout__region--first"> </div> <div class="layout__region layout__region--second"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p class="lead">UCLA Bruins, don’t let cybercrime affect your studies or social lives! UCLA IT Security offers simple resources, tips, and solutions to keep you safe both at school and home. </p> <p>Learn how to spot a phishing email, take control of your social networking privacy, and more by consulting the resources below:</p> <ul><li><a href="/services/multi-factor-authentication-mfa">Multi-Factor Authentication</a></li> <li><a href="/phish-bowl">Phishing Alerts</a></li> <li><a href="/report-cyber-security-concern">Report a Cyber Security Concern</a></li> <li><a href="https://myucla.it.ucla.edu/StudentWebMVC/app/secvlog">Ninjio videos</a></li> </ul></div> </div> </div> </div> Thu, 15 Apr 2021 18:00:14 +0000 vtrullinger@ucla.edu 1256 at https://ociso.ucla.edu Good Cybercitizens Make the Internet a Safer Place https://ociso.ucla.edu/security-best-practices/good-cybercitizens-make-the-internet-a-safer-place <span class="field field--name-title field--type-string field--label-hidden">Good Cybercitizens Make the Internet a Safer Place</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">January 02, 2018</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/itsec_05_17-18_january_feature-image-blank-992x500_0.png" width="992" height="500" alt="People standing to form the shape of a lock" typeof="foaf:Image" /></div> </article><p> </p> <p>The Internet is a very powerful and useful tool when used properly. In the same way that we should not drive without buckling the seat belt or ride a bike without a helmet, we should not venture online without taking some basic precautions. The <a href="https://staysafeonline.org/stay-safe-online/">National Cyber Security Alliance</a> reminds us that cybersecurity is everyone's responsibility as an individual and a member of our ever-growing online community.</p> <p>Below are some helpful tips to keep in mind as we work together striving to be good cybercitizens to create a better and safer digital world for ourselves and others.</p> <p><strong>Own your online presence.</strong> To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. You do not have to share everything with everyone. It is your choice to limit what (and with whom) you share personal information.</p> <p><strong>Be a good digital citizen.</strong> The things that you would not do in your physical life, do not do in your digital life. If you see crime online, report it the same way that you would in real life. Keep yourself safe and assist in keeping others safe on the Internet.</p> <p><strong>Respect yourself and others.</strong> Practice good netiquette, know the law, and do not do things that would cause others harm. The Golden Rule applies online, as well.</p> <p><strong>Practice good communications.</strong> Never send an e-mail typed in anger. Put it in your draft folder and wait. Keep in mind that digital communications do not give the reader the same visual or audio cues that speaking in person (or by video or phone) does.</p> <p><strong>Protect yourself and your information.</strong> Use complex passwords or passphrases, and don't reuse the same password or variations of a simple phrase. Better yet, enable two-factor authentication or two-step verification whenever possible.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Tue, 02 Jan 2018 16:52:48 +0000 lsouthwi@ucla.edu 1346 at https://ociso.ucla.edu Avoid Ransomware Attacks https://ociso.ucla.edu/security-best-practices/avoid-ransomware-attacks <span class="field field--name-title field--type-string field--label-hidden">Avoid Ransomware Attacks</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">September 28, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="full_bg_ribbon block block-layout-builder block-inline-blocksf-hero-banner block-type--sf_hero_banner panel"> <div class="banner--ribbon-text"> <div class="banner--ribbon"> <div class="banner--ribbon__image"> <div class="field field--name-field-sf-m-block-primary-img field--type-entity-reference field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-hero-banner-background-image"> <div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/styles/sf_hero_banner_bg/public/media/images/Ransomware%20hero.jpg?h=790be497&amp;itok=Gj1hw9Xy" width="2100" height="710" alt="Ransomware hero 1" typeof="foaf:Image" class="image-style-sf-hero-banner-bg" /> </div> </article> </div> </div> <div class="banner--ribbon__body"> <div class="banner--ribbon__body-inner"> <div class="banner--ribbon__brand"> <h2 class="banner--ribbon__title">Avoid Ransomware Attacks</h2> </div> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--twocol-section layout--twocol-section--33-67"> <div class="layout__region layout__region--first"> </div> <div class="layout__region layout__region--second"> <div class="block block-layout-builder block-inline-blocksf-basic block-type--sf_basic panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><h2>Overview</h2> <p>Ransomware a form of software specifically designed to disrupt, damage, or gain unauthorized access to a computer system. This malicious software then encrypts users’ files or locks their operating systems, rendering them unusable until a ransom is paid. Cyber criminals then demand large sums of money in exchange for decryption and restored access.</p> <h2>Insights</h2></div> </div> <div class="blue block block-layout-builder block-inline-blocksf-card block-type--sf_card panel"> <h2 class="panel__title">Ransomware Insights</h2> <div class="card card--bg-blue"> <div class="card__info-wrapper"> <div class="card__info"> <h2 class="card__title">Public schools and universities are becoming prime targets of large-scale ransomware attacks.</h2> <div class="card__text text-formatted"></div> </div> </div> </div> </div> <div class="block block-layout-builder block-inline-blocksf-basic block-type--sf_basic panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><layout-columns columns="3" gap="6"><div slot="column1"> <article class="align-center media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/Ransomware4_75.png" width="75" height="75" alt="Ransomware4_75" typeof="foaf:Image" /></div> </article><p><span><span><span><span><span><span><span><span>Over </span></span></span></span><span><span><span><span><strong>1500</strong></span></span></span></span><span><span><span><span> schools, colleges, and universities were impacted in 2020 with </span></span></span></span><span><span><span><span><a href="https://calmatters.org/education/2021/07/ransomware-attack-california/">California schools and universities</a></span></span></span></span> <span><span><span><span>being impacted more severely than any other state. </span></span></span></span></span></span></span></span></p> </div> <div slot="column2"> <article class="align-center media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/Ransomware2_75.png" width="75" height="75" alt="Ransomware2_75" typeof="foaf:Image" /></div> </article><p class="u-clear"><span><span><span><span><span><span><span><span>UC San Francisco was forced to pay </span></span></span></span><span><span><span><span><strong>$1.14 million</strong></span></span></span></span> <span><span><span><span>to a cyber-criminal gang in June 2020.</span></span></span></span></span></span></span></span></p> </div> <div slot="column3"> <article class="align-center media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/Ransomware3.png" width="75" height="75" alt="Ransomware3" typeof="foaf:Image" /></div> </article><p class="u-clear"><span><span><span><span><span><span><span><span>According to </span></span></span></span><span><span><span><span><a href="https://www.paloaltonetworks.com/company/press/2022/ransomware-payments-hit-new-records-in-2021-as-dark-web-leaks-climbed--according-to-new-report-from-palo-alto-networks-unit-42">Palo Alto Networks</a></span></span></span></span><span><span><span><span>, the average ransom demand rose </span></span></span></span><span><span><span><span><strong>144%</strong></span></span></span></span><span><span><span><span> in 2021 to </span></span></span></span><span><span><span><span><strong>$2.2 million</strong></span></span></span></span><span><span><span><span>, while the number of victims whose data was leaked grew by </span></span></span></span><span><span><span><span><strong>85%</strong></span></span></span></span><span><span><span><span> in 2021, both new record highs.</span></span></span></span></span></span></span></span></p> </div> </layout-columns><h2><br /> Security Tactics</h2> <ul><li><span><span>Update software and operating systems with the latest patches. Outdated applications and operating systems are the targets of most attacks.</span></span></li> <li><span><span>Never click on links or attachments in unsolicited emails.</span></span></li> <li><span><span>Back up data regularly. Use cloud storage where possible to manage offline backups.</span></span></li> <li><span><span>Follow safe practices when using devices that connect to the Internet.</span></span></li> <li>Delete suspicious e-mails. Deals that sound too good to be true are probably malicious. </li> <li>Use e-mail filtering options whenever possible. E-mail or spam filtering can stop a malicious message from reaching your inbox.</li> </ul><h2>Resources</h2> <ul class="list--link-icon"><li><a href="https://ucla.box.com/s/q4e0lyjls485g9oyetvbqwkkxoudisdi">Knowledge Article</a></li> </ul><p> </p> <div class="alert"><a href="https://ociso.ucla.edu/news/cyber-threat-actor-group-vice-society-targeting-ucla-and-education-sector"><strong>Check out our recent article about Cyber Threat Actor Group “Vice Society” Targeting UCLA and Education Sector.</strong></a></div></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Thu, 28 Sep 2017 15:57:01 +0000 lsouthwi@ucla.edu 1351 at https://ociso.ucla.edu Are You Practicing Safe Social Networking? https://ociso.ucla.edu/security-best-practices/safe-social-networking <span class="field field--name-title field--type-string field--label-hidden">Are You Practicing Safe Social Networking?</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">September 05, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/social_networking_feature-image-1400x478_v4_final.png" width="1400" height="478" alt="people sitting in a circle on computers" typeof="foaf:Image" /></div> </article><p><br /> Have you ever wondered who, besides your friends and family, might be seeing that strange selfie you posted on Facebook? Or who knows about your upcoming vacation to London? As much as social media sites try to keep your online information secure, there are no guarantees that your posts are completely private. In fact, people like the following might be trying very hard to find your personal info:</p> <ul><li><strong>Identity thieves.</strong> Social media offers a great return on investment for cybercriminals. Phone numbers, addresses, names, and other personal information can be harvested easily and used for identity theft.</li> </ul><ul><li><strong>Online predators.</strong> Are your friends interested in seeing your class schedule or calendar? Criminals could be, too. Knowing your whereabouts makes it easy for someone to victimize you, whether it’s breaking in while you’re gone or attacking you while you’re out.<br />  </li> <li><strong>Employers.</strong> Many employers use social networking sites and search engines to investigate applicants and current employees. Think twice before you upload a compromising picture, engage in a fiery political discussion, or post a controversial status update.</li> </ul><h2>How to Stay Safe</h2> <ul><li><strong>Don’t post private information online.</strong>  Don’t post your birthdate, address, phone numbers, or other personal data. And ask your friends to remove sensitive information about you from their posts. Never assume that anything posted is private.<br />  </li> <li><strong>Use privacy settings and review them regularly.</strong> Many sites provide settings that let you restrict public access to your profile. These settings often change over time, so make sure you keep an eye on them.<br />  </li> <li><strong>Be wary of others.</strong> Most social networking sites do not have a rigorous process to verify the identity of their users. Always be cautious when accepting a friend request—it might not be from the person you think.<br />  </li> <li><strong>Google yourself.</strong> Find out what other people can access by doing a search on yourself. Also, set up an <a href="https://www.google.com/alerts">automatic search alert</a> to notify you when your name appears online. (You might want to set alerts for your nicknames, phone numbers, and addresses as well.)<br />  </li> <li><strong>Understand hashtags.</strong> Hashtags (#) are a popular way to provide commentary or tag specific pictures. But in many cases, when you apply a hashtag to a post that is otherwise private, anyone who searches for that hashtag can see it.</li> </ul><p>Remember, what you post online can stay on the internet for a very long time. Practice safe social media networking.</p> <p>For more tips on social media safety, see our <a href="/security-best-practices/social-media-security-guide">Social Media Security Guide</a>, and <a href="https://www.it.ucla.edu/news/spring-clean-your-social-media-accounts">Spring Clean Your Social Media Accounts</a>.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/rCBJuHD7F-8">Watch Our Safe Social Networking Video</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Tue, 05 Sep 2017 16:06:24 +0000 lsouthwi@ucla.edu 1356 at https://ociso.ucla.edu Protect Your Online Identity https://ociso.ucla.edu/security-best-practices/protect-your-online-identity <span class="field field--name-title field--type-string field--label-hidden">Protect Your Online Identity</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">August 01, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/hero-protect-online-identity.png" width="992" height="500" alt="photo of applications on a smartphone" typeof="foaf:Image" /></div> </article><p> </p> <p>More of us are using social media to stay connected both personally and professionally. In fact, according to the <a href="http://www.pewinternet.org/fact-sheet/social-media/">Pew Research Center</a>, 69% of internet users in the United States participate in some form of social media—most commonly, Facebook, followed by Instagram—and these users can include current and future employers and recruiters (for college, sports, and jobs) who often use social media to assess employees and candidates. The type of information shared on social media can also provide fodder for phishing attacks and even identity theft.</p> <p>The internet is forever. Be careful what you’re posting and sharing, and with whom and what you are associating. To someone who doesn’t know you, your social media persona becomes a direct projection of who you might be and can create your online reputation.</p> <p>Please keep this advice in mind when sharing online:</p> <ul><li>Understand the default privacy settings on the social networking sites you use and how to change them to match your comfort level.</li> <li>Limit or disable the location settings on photos and videos you post to social networking sites.</li> <li>Don’t post photos or videos of inappropriate or illegal activities.</li> <li>Avoid joining online groups where you don’t know all the members or what causes they support.</li> <li>Find out who can access the information you are posting online, who controls and owns the information, and what is shared with a third party.</li> <li>Keep your personal information private. Question whether it’s necessary—it usually isn’t—to share sensitive information such as your birthday, mailing address, phone number, e-mail, mother’s maiden name, sexual orientation, or Social Security number. Consider making up alternate answers to those questions that only you would know.</li> <li>Don’t “check in” to every place you visit. That information could be used to identify you in a vulnerable location.</li> </ul><p>For more tips on social media safety, see our <a href="/security-best-practices/social-media-security-guide">Social Media Security Guide</a>, and <a href="https://www.it.ucla.edu/news/spring-clean-your-social-media-accounts">Spring Clean Your Social Media Accounts.</a></p> <p>The IT Security Office is always here to answer your questions. Keep watching our website, and connect with us on <a href="https://twitter.com/UCLA_ITSecurity">Twitter</a>.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/lLW1WMEzohQ">Protect Your Online Reputation Video</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Tue, 01 Aug 2017 16:10:39 +0000 lsouthwi@ucla.edu 1361 at https://ociso.ucla.edu Think You've Been Hacked? Here's How to Shake It Off. https://ociso.ucla.edu/security-best-practices/think-you%E2%80%99ve-been-hacked-here%E2%80%99s-how-shake-it <span class="field field--name-title field--type-string field--label-hidden">Think You&#039;ve Been Hacked? Here&#039;s How to Shake It Off.</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">July 03, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/security-feature-image-june-992x500px_v6_0.jpg" width="992" height="500" alt="Image of Pac Man game" typeof="foaf:Image" /></div> </article><p><br /> We’ve posted several articles this year about <a href="https://www.it.ucla.edu/news/its-data-privacy-day-protect-yourself">data privacy</a>, how to <a href="/security-best-practices/step-up-to-stronger-passwords">protect your accounts</a> with pass phrases and password managers, and how to <a href="https://privacy.ucla.edu/dont-get-doxxed-tell-data-brokers-youre-opting-out/">remove your private information</a> from data broker sites, but what can you do if, despite your best efforts, your account is hacked? And how would you know if it’s been hacked?</p> <p>Look for signs that your account might have been compromised:</p> <ul><li>Your friends tell you they’ve received a spam email from your account.</li> <li>Unfamiliar browser toolbars, homepages, or plugins appear.</li> <li>Your online passwords aren’t working.</li> <li>You see fake antivirus messages from software you didn’t install.</li> <li>Other programs you did not install are running or requesting elevated privileges.</li> <li>New accounts appear on your devices.</li> <li>Your bank sends you a message about insufficient funds and unauthorized charges.</li> <li>Collection companies are calling you.</li> <li>Your smartphone shows higher battery and data usage than normal, and strange charges appear on your bill.</li> <li>You receive an official notification about a cybersecurity breach at a place where you’ve done business.</li> </ul><p>Unfortunately, odds are that at least one of your accounts has been hacked in the last few years. You can check using the website, <a href="https://haveibeenpwned.com/">Have I Been Pwned</a>. If so, how do you remedy the problem?</p> <h2>Ways to “Shake off” an Attack:</h2> <ol><li>If you believe your work computer or UCLA account has been compromised, contact your local IT department as soon as possible.</li> <li>Change your passwords using a clean device.  If you use the same password for multiple accounts, it’s best to change them all, using <a href="/security-best-practices/step-up-to-stronger-passwords">these guidelines</a>.</li> <li>Back up important files.</li> <li>Update your mobile software and apps.</li> <li>Update your antivirus software and run a complete scan.</li> <li>Update your browser software and plugins.</li> <li>If your computer is still not working normally, consider doing a complete reformat to ensure all affected software is fixed.</li> <li>Don’t let an account hack turn into identity theft. Monitor your credit and report the issue to credit agencies if you believe your personally identifiable information has been stolen.</li> </ol><p>Finally, stay informed. The IT Security Office posts information about the latest <a href="/phishing-scams">phishing scams</a> on its website and <a href="https://twitter.com/UCLA_ITSecurity">Twitter</a> feed.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/MYGl6kSBAvY">Think You&#039;ve Been Hacked? (Video)</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Mon, 03 Jul 2017 16:13:48 +0000 lsouthwi@ucla.edu 1366 at https://ociso.ucla.edu Step Up to Stronger Passwords https://ociso.ucla.edu/security-best-practices/step-up-to-stronger-passwords <span class="field field--name-title field--type-string field--label-hidden">Step Up to Stronger Passwords</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">June 01, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/may-featured-image-992x500_0.png" width="992" height="500" alt="image of a username and password field" typeof="foaf:Image" /></div> </article><p> </p> <p>Security experts have said that if you can remember your password, it’s not strong enough. As hackers become more sophisticated, passwords become less effective. Many organizations—including <a href="https://www.it.ucla.edu/security/resources/mfa-at-ucla">UCLA</a>—now offer multi-factor authentication (MFA), which relies on additional credentials besides your password. But what do you do if a site does not offer MFA, and a password is the only safeguard between your personal information and the criminal underworld?</p> <p><strong>Make your passwords as long as possible. </strong>The longer it is, the harder to crack. It should be at least 14 characters or longer. One technique is to create a <em>passphrase</em> instead of a password: string two or three non-related words together. These should be words that you <em>cannot</em> find in the dictionary. Be sure to add numbers, symbols, and upper- and lowercase letters to your password.</p> <p><strong>Use a different password for every account.</strong> It might be inconvenient, but if one of your accounts is compromised, your others will still be safe.</p> <p><strong>Consider using a password manager. </strong>This software can generate incredibly complex and impossible-to-remember passwords for all of your accounts and store them in a virtual “vault” that usually resides encrypted on your hard drive. If you use a password manager, you need only remember one master password to log into it—but this password must be an excellent one. If someone is able to hack into your password manager account, all of your accounts will be at risk. Look for a password manager that offers MFA.</p> <p><strong>*Bonus Tip: Give Unpredictable Answers to Security Questions</strong>. Try answering security questions in an unexpected way. For example, if you’re asked for the make of your first car, you might answer, “Chocolate.”  Hackers who already have your password will be much less likely to guess your answers and gain access to your account.</p> <p>These tips will help you create a strong password, but the best protection is always to use MFA (also known as two-factor authentication or two-step verification) wherever it’s available. There is no substitute. MFA requires at least one other factor besides your password to gain access to an account, such as using a designated smart phone app to confirm each login attempt, or entering a code texted to your phone. Numerous sites now offer this extra layer of security, including Google, Microsoft, Apple, Facebook, and Evernote. (<a href="https://twofactorauth.org/">This website</a> can tell you who else is using it.)</p> <p><strong>Sign up today for </strong><a href="https://ucla.service-now.com/support?id=its_browse_service&amp;sys_id=b184ebb41b9c885038cec8415b4bcb33">MFA</a>—UCLA’s two-step verification solution—and check your other accounts to see if it’s an option. The extra step is worth the effort.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/gr0_XtEXjOE">Step Up to Stronger Passwords Video</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Thu, 01 Jun 2017 16:19:42 +0000 lsouthwi@ucla.edu 1371 at https://ociso.ucla.edu Device Theft – What’s Your Personal Back-up Plan? https://ociso.ucla.edu/security-best-practices/device-theft-whats-your-personal-backup-plan <span class="field field--name-title field--type-string field--label-hidden">Device Theft – What’s Your Personal Back-up Plan?</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">April 03, 2017</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/featured-image-security-more-blue-gradient_0.jpg" width="992" height="500" alt="someone grabbing a phone out of another person's bag" typeof="foaf:Image" /></div> </article><p> </p> <p>With the rising use of electronic devices such as laptop computers, tablets, cellular phones, and other personal electronics, they have become a target of choice for thieves all over. Because these devices make it easier to store and access information for personal and professional use, they can also put your data at risk. Theft is a significant threat to users of these devices, especially when using them to access your personal information, bank accounts, or work on-the-go.</p> <p>The cost of a stolen tablet, laptop, or other small electronic device is not solely its replacement cost, but also the cost of peripherals and accessories, the installed software, and the cost of any information that is compromised from that device.<br /> An even greater cost (if your employer issued your device) is the potential exposure and liability that may result from any compromised confidential corporate and client information.</p> <p>Do you know what to do if your device is lost or stolen?  The tips below provide effective theft-prevention techniques and proactive measures to protect your devices and personal data.</p> <h2>Be Aware.</h2> <p>Be aware of the three most common areas where mobile devices and laptops are stolen: airports, mass transit and automobiles – and always keep your items concealed when in a public place. When traveling, carry your devices in a nondescript carrying case, briefcase, or bag when moving about. Placing these items in a case designed for computers is an immediate alert to thieves that you have these valuable devices.</p> <h2>Don't Leave Your Device Alone, Even for a Minute!</h2> <p>If you're not using it, lock your device in a cabinet or drawer, use a security cable, or take it with you.</p> <h2>Differentiate Your Device.</h2> <p>If your device looks unique, it's less likely that someone will steal your device and say they thought it belonged to them. Sometimes identifying markings make the laptop harder to resell, so they're less likely to be stolen. Use a permanent marking, engraving, or tamper-resistant commercial asset tracking tag.</p> <h2>Secure Your Devices.</h2> <p>Use a passphrase, password, or fingerprint to secure your device from casual intrusion. If you choose to use a password, it is important to be sure to choose different passwords for different programs or devices.</p> <h2>Install Location Tracking Software.</h2> <p>Install and use tracking and recovery software included with most devices (e.g., the "Find My iPhone" feature in iOS) or invest in commercial products like LoJack for Laptops or Prey. Some software includes remote-wipe capabilities. This feature allows you to log on to an online account and delete all of the information on your device. There are subscriber and free versions of this type of software, and each provides a different set of features. Search online to find the best combination of function and cost to meet your needs.</p> <h2>Encrypt and Backup Information.</h2> <p>Determine if your device automatically encrypts your data, and make sure that you regularly back up your information. Keep an external copy of any important files stored on your devices in a safe location.  If your device doesn't use encryption by default, enable it or install encryption software.</p> <h2>Write It Down!</h2> <p>Record the manufacturer, model, and serial number of your mobile devices and store the info in a safe place. This information can be useful for filing a police report and verifying your device, if it's found.</p> <h2>File a Report.</h2> <p>If your device is stolen, file a police report immediately.</p> <h2>Notify Providers.</h2> <p>Keep important phone numbers such as your cell phone provider or IT support department handy, so you can quickly report the device as lost or stolen. In some cases, the cell phone provider or your support desk may be able to deactivate, lock, or wipe the device for you remotely.</p> <p>Device theft and data loss are escalating concerns for all users. According to the FBI, 97 percent of stolen devices are never recovered. As we become increasingly more mobile and rely on multiple mobile devices including laptops, smartphones, and tablets to conduct business, crimes associated with these devices are also on the rise. Criminals are increasingly becoming more innovative and inventive in finding ways to steal valuable information from mobile devices and laptops that don’t have appropriate security. Be aware, be secure, and more importantly, be prepared with your personal backup plan. </p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/NnDKnerA2jE">Device Theft Video</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Mon, 03 Apr 2017 16:28:49 +0000 lsouthwi@ucla.edu 1381 at https://ociso.ucla.edu Preventing Identity Theft https://ociso.ucla.edu/security-best-practices/preventing-identity-theft <span class="field field--name-title field--type-string field--label-hidden">Preventing Identity Theft</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">October 31, 2016</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-image-media-type media--view-mode-default"><div class="field field--name-field-media-image field--type-image field--label-hidden field__item"> <img loading="lazy" src="/sites/default/files/media/images/identity-theft-word-cloud_v4.png" width="992" height="500" alt="identity theft word cloud" typeof="foaf:Image" /></div> </article><p>Identity theft is a serious crime where a thief steals and subsequently uses critical portions of your personal information, such as your full name, date of birth, or social security number usually to commit financial fraud. An identity thief uses your information to fraudulently apply for credit in your name, file a fraudulent tax return on your behalf, gain access to medical services, or impersonate you on social media.  These criminal acts can damage your credit score and potentially deny you access to your own credit resources; and can potentially cost you a significant amount of time and money in legal costs to restore your reputation. You may not know that you are the victim of identity theft until you experience a direct financial consequence (unexpected bills, credit collections, or denied loans) related to the actions that the thief has taken on your behalf by using your stolen information.</p> <p>On the basis of the summary description of the problem above, the protection of the critical portions of your personal identifying information (PII) is paramount to the prevention of identity theft. Secondly, proactive early detection, or prevention services to alert you or to specifically block certain actions from occurring without your knowledge and/or approval are often a worthwhile investment.</p> <h2>Protecting Your Pii</h2> <p><strong>Tax fraud</strong>: The IRS has a type of two-factor authentication via an “IP PIN” available to prevent someone from fraudulently filing a tax return on your behalf.  For tax year 2015, the IRS paid out over 5.8 billion dollars in fraudulent refunds to criminals using stolen identity information to file fraudulent tax returns. Information on the IP PIN feature can be found here: <a href="https://www.irs.gov/individuals/get-an-identity-protection-pin">https://www.irs.gov/individuals/get-an-identity-protection-pin</a>. Also, you should consider opening an online account at irs.gov and at the Social Security Administration so that a potential identity thief can’t potentially open one on your behalf. If you create an online account, you can then subsequently lock that account out permanently if you wish requiring all further interaction with the IRS to occur via written correspondence and postal mail.</p> <p><strong>Credit bureaus, monitoring, and alerting services</strong>: You can use a credit monitoring and alerting service such as LifeLock, ProtectMyID, etc. These paid services typically file recurring “fraud alerts” or “security alerts” with all four major credit bureaus (Equifax, Experian, Trans Union, and Innovis) on your behalf to prevent the use of your personal information without your direct involvement (via positive contact) and actively monitor (real time) your credit history. You can also do many of these things yourself if you are proactive. You can request a free credit report with all four credit bureaus once per year, plus if you file a “fraud alert” with the bureaus every ninety days you can run an additional report at no charge.  Filing an alert causes lenders to more carefully verify your identity whenever your personal information is used to apply for credit. Consumers who can demonstrate that they are victims or are likely to be victims of identity theft due to involvement in a data breach involving PII can apply for a long-term, “extended fraud alert” with all four credit bureaus that lasts up to seven years (a police report and/or other documentation may be required). Check the SSNs associated with your children as well periodically.  Identity thieves often use information from minors since that information is not usually readily used or monitored. Parents or guardians may want to consider freezing the credit files of their younger children or dependents to prevent fraudulent use until there is a need to unfreeze them in the future when they will be actively used.<br /><strong> <br /> Checking and savings accounts</strong>: Most banks offer a real-time monitoring service for checking, savings, ATM/Debit, and credit card accounts that alert you whenever a transaction occurs. This can help you to limit fraudulent use of your account to as few transactions as possible since you are immediately aware that a transaction that you do not recognize has occurred and you can rapidly contact your bank.<br />  <br /><strong>Medical identity theft</strong>: Guard your Social Security, Medicare, and health insurance plan identification numbers. Only give your number(s) to your physician or other approved health care providers. Review your insurance statement and explanation of benefits forms or Medicare summary notices to make sure that any claims match services that you actually received. Report all questionable charges to your health insurance provider or Medicare promptly. Request and carefully review a copy of your medical records at least bi-annually for inaccuracies and conditions that you don’t actually have that may have shown up in your records due to fraudulent use.</p> <h2>Steps You Can Take</h2> <ul><li>Secure your social security number. Don’t carry your social security card in your wallet or write the number on your checks. Only give out your social security number (SSN) when absolutely necessary to trusted individuals.</li> <li>Don’t respond to unsolicited requests for personal information (your name, birthdate, social security number, or bank account number) by phone, by mail, or online.</li> <li>Cover the keypad or keyboard when typing your passwords on computers and at ATMs.</li> <li>Collect your postal mail promptly. Always ask the post office to put your mail on hold when you are away from home and you cannot promptly retrieve your mail.</li> <li>Pay attention to your billing cycles. If any bills or financial statements are late, contact the sender.  Sometimes a thief will file a change of address on your behalf.</li> <li>Review your credit receipts. Ask for any carbon copies, incorrect charge slips, or refund slips as well.  Promptly compare your receipts monthly with your account statements and look for any unauthorized transactions.</li> <li>Shred all old receipts, all new credit offers received in the mail, any old account statements, and all expired cards, to prevent “dumpster divers” from getting your personal information.</li> <li>Store any personal information in a safe place both at home and at work.</li> <li>Use complex passwords that identity thieves cannot guess easily and multifactor authentication when available so that compromised credentials cannot be easily used to gain access to accounts.  Change your passwords regularly and change them immediately if any company that you do business with has a security breach.</li> <li>Order your credit report at least once a year and review it carefully to be certain that it doesn't include accounts that you have not opened. Check it more frequently if you suspect someone has gained access to your account information.</li> </ul></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="https://youtu.be/En0rceW7nIc">Preventing Identity Theft Video</a></li> <li class="field__item"><a href="https://identitytheft.gov/">IdentityTheft.gov</a></li> <li class="field__item"><a href="https://www.irs.gov/uac/report-phishing">IRS Report Phishing</a></li> <li class="field__item"><a href="https://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf">Federal Trade Commission - What to Do if Your Identity Is Stolen (PDF)</a></li> <li class="field__item"><a href="https://www.ai.equifax.com/CreditInvestigation/home.action">Equifax Online Dispute Information</a></li> <li class="field__item"><a href="http://www.transunion.com/fraud-victim-resource/place-fraud-alert">Transunion Fraud Alert</a></li> <li class="field__item"><a href="https://www.innovis.com/fraudActiveDutyAlerts/index">Innovis Fraud Alert</a></li> <li class="field__item"><a href="https://www.experian.com/fraud/center.html">Experian Fraud Center</a></li> <li class="field__item"><a href="https://www.irs.gov/pub/irs-pdf/f14039.pdf">IRS - Identity Theft Affidavit (PDF)</a></li> <li class="field__item"><a href="http://krebsonsecurity.com/2016/01/the-lowdown-on-freezing-your-kids-credit/">KrebsonSecurity - Freezing Your Kids Credit</a></li> <li class="field__item"><a href="http://krebsonsecurity.com/2015/12/dont-be-a-victim-of-tax-refund-fraud-in-16/">KrebsonSecurity - Don&#039;t Be a Victim of Tax Fraud in &#039;16</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> <div class="tags__tag field__item"><a href="/tags/staff-faculty" hreflang="en">Staff &amp; Faculty</a></div> </div> </div> </div> </div> </div> Mon, 31 Oct 2016 21:29:15 +0000 lsouthwi@ucla.edu 1411 at https://ociso.ucla.edu Social Media Security Guide https://ociso.ucla.edu/security-best-practices/social-media-security-guide <span class="field field--name-title field--type-string field--label-hidden">Social Media Security Guide</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/51" typeof="schema:Person" property="schema:name" datatype="">lsouthwi@ucla.edu</span></span> <span class="field field--name-created field--type-created field--label-hidden">September 29, 2016</span> <div class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="block block-layout-builder block-field-blocknodesf-pagebody panel"> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><article class="media media--type-sf-video-media-type media--view-mode-default"></article><h2>Social Media Tips</h2> <ul><li>Don’t input, store, or post personal or sensitive information on social media platforms.</li> <li>Exercise good judgement!  Once you post, that information has been seen by others and in some cases cannot be retracted.  Filter what is posted about you and by whom by requiring permission before posts become visible. </li> <li>Be cautious with information sharing.  Maintain your personal privacy settings on social media systems and do not allow any personally identifiable information to become visible to others.</li> <li>Change passwords regularly, use a complex password and/or use multi-factor authentication when available.</li> </ul><h2>Social Media Risks</h2> <h3>Geotagging: What Is It?</h3> <p>Geotagging adds geographical identification data to photos, videos, websites and text messages through location-aware applications. This technology helps people file images and information based on a location from a mobile device or desktop computer.  </p> <h4>What Is the Risk?</h4> <p>You should be cautious when enabling the geotagging features on mobile, location-based apps or certain camera devices because this feature could create personal security risks.  Be certain to disable geotagging features at sensitive locations or you may inadvertently tell people exactly where you are, where you work, or where you live with GPS accuracy.</p> <h3>Audience: What Is It?</h3> <p>Audience is a general term that describes who is able to view and/or comment on your posts.  </p> <h4>What Is the Risk?</h4> <p>Be aware that your audience can change at any time and may be able to view a post containing information about you.  You may have only intentionally shared something with your “friends”, but who they share it with could be out of your control.  “Friends of friends” is quite often a very large group of people – many of which you may not know or even associate, so choose your audience wisely.</p> <h3>Identity: What Is It?</h3> <p>Identity is a general term to describe information that pertains specifically to one individual.</p> <h4>What Is the Risk?</h4> <p>There are individuals who use social media as a research method seeking identity information, with possible nefarious intentions such as identity theft, fraud, impersonation, or intimidation.</p></div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-related-links panel"> <div class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon"> <div class="field__label">Related Links</div> <ul class="field field--name-field-sf-related-links field--type-link field--label-above list--link-icon field__items"> <li class="field__item"><a href="/news/national-cyber-security-awareness-month">Cyber Security Awareness Month</a></li> <li class="field__item"><a href="/news/events">Events</a></li> <li class="field__item"><a href="https://security.ucop.edu/resources/cyber-security-month/webinars.html">Cyber Security Webinars</a></li> <li class="field__item"><a href="/news/additional-cyber-security-resources">Additional Cyber Security Resources</a></li> </ul> </div> </div> <div class="block block-layout-builder block-field-blocknodesf-pagefield-sf-tags panel"> <div class="field field--name-field-sf-tags field--type-entity-reference field--label-above u-space-mb--large"> <div class="field__label heading--primary">Tags</div> <div class="field__items tags"> <div class="tags__tag field__item"><a href="/tags/security-best-practices" hreflang="en">Security Best Practices</a></div> <div class="tags__tag field__item"><a href="/tags/students" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Thu, 29 Sep 2016 21:46:43 +0000 lsouthwi@ucla.edu 1416 at https://ociso.ucla.edu