NCSAM 2017 - Week 1: Stop. Think. Connect.

NCSAM NCSAM
If you have a computer, mobile device, email address, online accounts, and/or engage in any online activities, your information has tremendous value to cyber criminals. As long as you are connected to the Internet, you are at risk.

Fortunately, you can help protect yourself from cyber attacks by taking the following steps:
  • Educate yourself on the various types of cyber crime.
  • Create complex passwords and utilize multi-factor authentication whenever possible.
  • Think before you click unsolicited or unknown links – if it looks suspicious, it probably is.
  • Be selective about the information you share with others.
  • Ensure you connect to the Internet on a secure WiFi network – avoid public or “free” WiFi from places like airports or coffee shops.
  • Keep your devices up-to-date with the most current operating system and antivirus software.
  • Always be cautious about what you do online, where you visit, and what you post to public social networks.

The information below demonstrates the many different ways cybercriminals can make money by hacking you:
  • Usernames and Passwords: Cybercriminals can install programs on your computer that capture all your keystrokes, including your username and password. That information is then used to log into your online accounts, such as: your bank or financial accounts, where they can steal or transfer your money; your iCloud, Box, Google Drive, or Dropbox account where they can access all your sensitive data; your Amazon, Walmart, or other online shopping accounts where they can purchase goods in your name; and/or your UPS or FedEx accounts, where they ship stolen goods in your name.

  • Botnet: Your computer can be connected to an entire network of hacked computers controlled by the cybercriminal. This network, called a botnet, can then be used for activities like sending out spam to millions of people or even launching Denial of Service (DoS) attacks, which attempt to block an important online service such as banking.

  • Email Harvesting: Criminals can read your email for information they can sell to others, such as: all the names, email addresses, and phone numbers from your contact list; and/or all of your personal or work email.

  • Extortion: Hackers can take over your computer and demand money. Some examples include: taking pictures of you with your computer camera and demanding payment to destroy or not release the pictures; encrypting (locking) all of the data on your computer and demanding payment to decrypt it; and/or tracking all websites you visit and threatening to publish them.

  • Financial: Cybercriminals can scan your system looking for valuable information, such as your credit card information, your tax records and past filings, and/or your financial investments and retirement plans. This information may be sold on the black market and often results in identity theft!

  • Identity Hijacking: Identity thieves can steal your online identity, such as: your email accounts; your Facebook, Twitter, or LinkedIn accounts; and/or your Skype or other instant messaging accounts.

  • Virtual Goods: Bad actors can copy and steal any virtual goods you have and sell them to others. Some examples include your online gaming characters, gaming goods, or gaming currencies; and/or any software licenses, operating system license keys, or gaming licenses.

  • Web Server: Criminals can turn your computer into a web service, which they can use to carry out malicious activities such as hosting phishing websites to steal other people’s usernames and passwords; hosting attacking tools that will hack people’s computers; and/or distributing child pornography, pirated videos, or stolen music.

If something seems odd or suspicious, it is most likely an attack. Common sense is your best defense!

If you have any questions about cybersecurity or want to learn more about how to stay safe online, please contact University of Miami’s Information Security Office at: ciso@miami.edu or visit: http://security.it.miami.edu for more information.


Click here or on the image below to download UMIT's 2017 NCSAM poster:

Feel free to print this poster and share it with your colleagues/peers!