<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; Lori Bush</title>
	<atom:link href="https://loribush.org/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://loribush.org</link>
	<description>Cary Town Council, At-Large Representative</description>
	<lastBuildDate>Wed, 31 Oct 2012 23:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>
	<item>
		<title>Don&#8217;t Get Tricked</title>
		<link>https://loribush.org/2012/10/31/dont-get-tricked/</link>
		
		<dc:creator><![CDATA[Lori]]></dc:creator>
		<pubDate>Wed, 31 Oct 2012 23:31:22 +0000</pubDate>
				<category><![CDATA[Citizens]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://loribush.org/?p=634</guid>

					<description><![CDATA[As I write this up, it is the last day of &#8220;National Cyber Security Awareness Month&#8221; as well as Halloween, so I thought it would be the perfect time to do one last pitch for being Cyber Security Aware. As you get ready to put on your (or help your child put on their) costume [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>As I write this up, it is the last day of <em><strong>&#8220;National Cyber Security Awareness Month&#8221;</strong></em> as well as <strong>Halloween</strong>, so I thought it would be the perfect time to do one last pitch for being Cyber Security Aware.</p>
<p>As you get ready to put on your (or help your child put on their) costume &#8211; remember, you aren&#8217;t the only one out there pretending to be someone else.  There are many hackers, pretenders and &#8220;bad actors&#8221; pretending to be someone or something else.  The act of pretending to be someone or something you are not is a tactic many cyber criminals have used since the Internet began.  This can be called <strong><em>&#8220;spoofing&#8221;</em></strong> or sometimes called a <em><strong>&#8220;phishing attack&#8221;</strong></em> &#8211; with the with real and scary intention to get access to your personal information, or to do harm to a computer network.</p>
<h5><strong>What is it, and Why do I care?</strong></h5>
<p>Phishing and Spoofing are very similar, in that they are trying to get you to do something based on <strong>fake or forged documents or information.</strong>  &#8220;<span style="font-size: 14px;">Spoofing is the dissemination of the email from a “spoofed” (or FAKE) email address, and phishing is often used in conjunction with a spoofed email. Phishing is the act of sending an email falsely claiming to be from an established legitimate business to trick the recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account numbers.&#8221; </span>(This description from the <a title="DHS" href="http://www.dhs.gov" target="_blank">Department of Homeland Security</a>, and you can learn more from the <a title="IC3" href="http://www.ic3.gov/default.aspx" target="_blank">Internet Crime Complaint Center (IC3</a>))</p>
<p>These types of attacks can be hard to detect &#8211; and in many cases, a &#8220;spoofed&#8221; email can look very real  So, how do you tell?</p>
<h5><strong><span id="more-634"></span>Watch for these warning signs</strong></h5>
<ol>
<li>First, a bank will NEVER tell you to log in to a website to fix something. <strong>DO NOT</strong> click on that link in the email.</li>
<li><strong>Do not reveal personal or financial information in email</strong>, (don&#8217;t send  and do not respond to email solicitations for this information. This includes following links sent in email.</li>
<li><strong>Do not send sensitive information over the Internet</strong> without checking a website&#8217;s security (look for that &#8220;S&#8221; after the HTTP)</li>
<li><strong>Pay close attention to the URL of a website</strong> (that&#8217;s the title at the TOP of your browser, starting with a HTTP). Malicious and fake websites may look identical to the real site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).</li>
</ol>
<h5><strong>Help your Kids Be Safe</strong></h5>
<p>When I teach Internet Safety classes to teens, the kids are often surprised when I show up and start rattling off information I know about them that I have found by just trolling the Internet.  I point to each one, say their name, where they live, where they have gone on vacation or maybe mention their brothers or sisters or talk about their favorite sports.  There&#8217;s always a girl in the class that starts looking around from friend to friend with a look of sheer paranoia on her face.</p>
<p>I do my best to talk about the big items &#8211; like <strong>Cyber Bullying, Cyber Security,</strong> and the longevity of information on the Internet.  We talk about how a whisper on the internet is like a scream in a crowded mall &#8211; with an echo that lasts forever.</p>
<p>We also talk about the ramifications of &#8220;poor choices&#8221; on the Internet.  Some of those &#8220;poor choices&#8221; could even land them in jail!  <a href="http://www.csoonline.com/article/720273/cyber-bullies-blame-the-parents" target="_blank">More than 82% of parents say their children have been exposed to cyber-bullying</a>. And North Carolina recently became the<strong> <a title="Cyberbullying crime" href="http://www.voxxi.com/north-carolina-cyberbullying-teachers/" target="_blank">first state to make student cyberbullying of teachers a crime</a>.</strong> Starting December 1st,  the <em><a title="Full Law" href="http://www.ncleg.net/Sessions/2011/Bills/Senate/PDF/S707v6.pdf" target="_blank">School Violence Prevention Act of 2012</a></em> will take effect that will make it a Class Two Misdemeanor for any student posting online that cyberbully, intimidate, or torment a school employee or teacher. This new legislation will<strong> impose jail time or a $1,000 fine on anyone attempting to bully a teacher online.</strong></p>
<h5><strong>Tips to Help With Your Technology Aware Kids</strong></h5>
<ul>
<li><strong><br />
</strong></li>
<li><strong>Be involved</strong> &#8211; and talk about the Web. What they see, what they search for, and how they use it for their homework. Show them how to be a &#8220;smart cyber citizen&#8221; &#8211; to not pass on Urban Legends and hoaxes that continue on the Internet.  Have them look up strange offers or hoaxes at <a href="www.snopes.com." target="_blank">www.snopes.com.</a></li>
<li><strong>Keep your computer in an open area</strong> &#8211; Keeping your computer in an area where you can see them, and what they are doing, is a great way to help them as they start out on the web.  If you see a behavior that&#8217;s inappropriate, you can correct and remediate it, immediately.</li>
<li><strong>Be clear with rules, and dangers out there &#8211; </strong>Kids need to know your expectations. What they can do, what they can&#8217;t, how long they can be on the computer, and what they need to be aware of.</li>
<li>Talk about the <em><strong>ethical issues</strong></em> with downloading pirated music and videos (a common teen activity) and how it can increase their risk of downloading viruses and other malware. Make sure that teens are familiar with legitimate ways to stream or download music and videos online. (Check out <a href="http://www.pandora.com" target="_blank">Pandora</a>, <a href="http://8tracks.com" target="_blank">8Tracks</a>, <a href="http://www.iheart.com" target="_blank">iHeart</a>, <a href="http://www.spotify.com/us/desktop-splash/?utm_source=spotify&amp;utm_medium=web&amp;utm_campaign=start" target="_blank">Spotify</a>)  And finally, make sure they have security software on their devices.</li>
<li><strong>Watch them</strong>&#8211; Be aware of what your child is doing on the computer, by monitoring their computer activity &#8211; such as which websites she is visiting. If she is using email, instant messaging, or chat rooms, and make sure she knows who is on the other end<strong>Be open to questions  </strong>&#8211; Make sure they know they can come to you with ANY question, concern or problem.<strong>Think about parental controls and separate partitions</strong>&#8211; Most operating systems will allow you to create a different user account for each user. That makes it easy to give different access to different users on the same PC.  Parental controls are also available within your browser. In fact, Internet Explorer allows you to restrict or allow certain websites to be viewed on the computerCheck out this cool <a href="http://mashable.com/2012/10/31/spooky-cybersecurity/?utm_source=twitterfeed&amp;utm_medium=twitter&amp;utm_campaign=Feed%3A+Mashable+%28Mashable%29">INFOGRAPHIC &#8211; on the &#8220;Spooky Side of Cyber Security&#8221;</a> Perfect for Halloween!</li>
</ul>
<p><em>Hope this information helps &#8211; and stay safe out there. </em></p>
<div></div>
<div></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security and You</title>
		<link>https://loribush.org/2012/10/05/cyber-security-and-you/</link>
		
		<dc:creator><![CDATA[Lori]]></dc:creator>
		<pubDate>Fri, 05 Oct 2012 16:35:01 +0000</pubDate>
				<category><![CDATA[Citizens]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[staysafeonline]]></category>
		<category><![CDATA[web]]></category>
		<guid isPermaLink="false">http://loribush.org/?p=611</guid>

					<description><![CDATA[So, do I have your attention now? How many of you knew where that quote (&#8220;Keep it Secret, Keep it Safe&#8221;) came from, and just wanted to read an article about “Lord of the Rings?” 🙂 Sorry to disappoint, but this post is all about Cyber Security. I know, boring stuff, but October is Cyber [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>So, do I have your attention now? How many of you knew where that quote (<em>&#8220;Keep it Secret, Keep it Safe&#8221;</em>) came from, and just wanted to read an article about “Lord of the Rings?” <img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Sorry to disappoint, but this post is all about <strong>Cyber Security.</strong> I know, boring stuff, but<strong> October is Cyber Security Awareness Month</strong>, and helping people use technology, and use it safely, has been my passion for a while now.</p>
<p>And, let’s face it, today <strong><em>so much of our lives are connected to some sort of digital device</em></strong>, as well as the information on them; it makes sense to put some protections in place to keep your information secret, and to keep it safe. That’s why I partnered with the Town of Cary Police Department to <a href="http://www.townofcary.org/Town_Council/Agendas___Minutes/Staff_Reports/Cyber_Security_Awareness_Month_Proclamation.htm" target="_blank">recognize and support October as <em>Cyber Security Awareness Month</em></a>, and also why our Police department works hard to protect you with an impressive <a href="http://www.townofcary.org/Departments/police/Community_Services/cybersecuritytips.htm" target="_blank">Cyber Crime unit</a>.</p>
<h5><strong>First, some chilling numbers</strong></h5>
<p>Whether you are at work, at home, school – every part of our lives now has a connection to the Internet.</p>
<p><span style="text-decoration: underline;">Did you know that&#8230;</span></p>
<p>&#8211; Someone becomes a<strong> victim of cyber crime every 18 seconds</strong><br />
&#8211; Cyber crime costs an average of nearly <strong>$200 per victim</strong><br />
&#8211; Mobile device <strong>vulnerabilities doubled in 2011</strong> from 2010<br />
&#8211; <strong>40% of social network users have been victims</strong> of cyber crime on a social networking site<br />
&#8211;<strong> 1 in 4 people received notification</strong> by a business, online service provider, or organization that their personally identifiable information (password, credit card number, email addres, etc.) was lost or compromised because of a data breach<br />
<em> (Source: Symantec and <a title="NCSA" href="www.staysafeonline.org" target="_blank">National Cyber Security Alliance</a>)</em></p>
<p><span id="more-611"></span></p>
<h5><strong>What can you do?<br />
</strong></h5>
<p><strong><a href="www.stopthinkconnect.org"><img decoding="async" loading="lazy" class=" wp-image-614 alignright" title="Stop. Think. Connect." src="https://loribush.org/wp-content/uploads/2012/10/stopthinkconnect-300x61.png" alt="" width="240" height="49" srcset="https://loribush.org/wp-content/uploads/2012/10/stopthinkconnect-300x61.png 300w, https://loribush.org/wp-content/uploads/2012/10/stopthinkconnect.png 302w" sizes="(max-width: 240px) 100vw, 240px" /></a></strong></p>
<ol>
<li><strong>STOP. THINK. CONNECT.</strong> This should really be your mantra. Think of it like “stop, drop and roll” as we learned from our firefighters when we were kids. In this case it’s a quick way for you to be aware of where you are “clicking” while surfing the web. Take a look at the <a href="http://www.stopthinkconnect.org" target="_blank">Stop. Think. Connect. Website</a> for more information.</li>
<li><strong>Protect before you connect</strong>, keep your machine clean.</li>
<ol>
<li>Make sure your software is up-to-date, including your operating system, security software and web-browsers. That’s your first defense against online threats and viruses. (Automate it, if you can!)</li>
<li> Be careful of what you PLUG IN to your machine – if you don’t know where that USB device came from, don’t plug it into your machine. You never know what viruses or malware is lurking on a rogue USB key.</li>
</ol>
<li><strong>Keep it Secret &amp; Safe &#8212; don’t use simple or lazy passwords</strong>– make them long and strong. Use CAPITAL and lowercase letters with numbers and special symbols. (Please, no dog, cat or child names)Use unique passwords for accounts: Don’t use the same password for different accounts. If they are hard to remember, try using a Password management program like 1Password, LastPass, KeePass or others.</li>
<li><strong>Own your online reputation</strong> – make sure to review your privacy and security settings on social sites like Facebook, Twitter, etc. Know how, and with whom you are sharing information.</li>
<li><strong>Connect Safely and when in doubt, throw it out.</strong><br />
<iframe loading="lazy" src="http://www.youtube.com/embed/D6NQmIgqNh4" frameborder="0" width="420" height="315"></iframe></li>
<ol>
<li><strong><em>Be careful of links</em></strong> – whether they are in email, tweets, posts and in ads – it is a common way for cyber criminals get into your computer.Know your hotspot – don’t jump on a hotspot just because it’s available. Make sure to adjust your security settings, and avoid sensitive transactions while on a network you don’t know.</li>
<li><em><strong>Turn off file sharing and network discovery</strong></em> when you are on a public wirless network, these can put your device at risk. (This is under the Control Panel&gt;Network and Internet&gt; Network and Sharing Center on Windows, and under System Preferences&gt;Sharing on Mac OSX)</li>
<li><em><strong>Shopping online?</strong></em> Always check for SECURE services – a little gold lock at the bottom of the page shows you that you are on a secure site. The site should have URL that starts with http<em><span style="text-decoration: underline;">s</span></em>:// instead of just http://)</li>
</ol>
<li><strong>Back, Back, Back it up: </strong> Protect your valuables by having a backup, that includes your music, pictures, and other documents. Make sure to store it separately.</li>
</ol>
<h5><strong>Be careful</strong></h5>
<p>With more than 50% of Cary citizens owning Smartphones, and a <a href="http://www.pewinternet.org/Reports/2012/Tablet-Ownership-August-2012.aspx">quarter of American adults on Tablet computers</a> , the need for being vigilant about your online safety has truly gone mobile.  Make sure to keep these safety ideas in mind as you surf and shop online.</p>
<p><span style="text-decoration: underline;">For more information check out some of these great websites:</span></p>
<ul>
<li>FTC <a href="http://www.onguardonline.gov">OnGuardOnline.gov</a></li>
<li><a href="http://www.staysafeonline.org">Stay Safe Online</a> (National Cyber Security Alliance)</li>
<li><a href="http://stopthinkconnect.org">Stop. Think. Connect. </a></li>
<li><a href="http://www.fosi.org">Family Online Safety Institute</a></li>
<li>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</li>
</ul>
<p>&nbsp;</p>
<p>Featured photo by <em><a href="http://www.flickr.com/photos/77519207@N02/">Elhombredenegro</a></em></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
