A large part of what we do at the Bureau of Information & Telecommunications (BIT) is protect sensitive information. Safeguarding your data is our #1 priority. Recently, Governor Noem was down in Florida speaking about cybersecurity. If you are unfamiliar with cybersecurity, it is the protection against criminal or unauthorized use of electronic data. Cybersercurity has been selected as the most important challenge for the current year by the Chief Information Officers across the country.
Cyber thieves are appearing everywhere and are a major threat to all of us. Our goal is to stop the hackers from attacking you and your agency. Let's look at a few areas that BIT focuses on to safeguard your information.
These hackers are attacking the assets of your company, which is you! At BIT, we are responsible for making sure all the pieces of your security puzzle go together and any gaps can compromise that security. Unfortunately, the human element is what usually fails, opening the gap for hackers. Education and training are how we can tackle this head on. Recently, Jim Edman, BIT Chief Information Security Officer, spoke to a large group within the state about cybersecurity and how you can be protected. These types of open forums are a key part to raising awareness on this issue.
Both examples may look like valid emails and most email users aren't going to know the areas to check prior to clicking a button. This is where training comes into play. With some minor training and tools, you can instantly protect yourself from these hackers.
You'll notice phishing emails increase when emotional events are taking place. For example, election time, natural disasters or socially sensitive topics. This is because the hackers want you to be so emotionally attached to the topic that you immediately click on the button without thinking about it being a suspicious email. The easiest tool you can use right now to protect yourself is to slow down. Take a few seconds to skim the email and follow the best practices below.
Cyber thieves are appearing everywhere and are a major threat to all of us. Our goal is to stop the hackers from attacking you and your agency. Let's look at a few areas that BIT focuses on to safeguard your information.
Awareness
These hackers are attacking the assets of your company, which is you! At BIT, we are responsible for making sure all the pieces of your security puzzle go together and any gaps can compromise that security. Unfortunately, the human element is what usually fails, opening the gap for hackers. Education and training are how we can tackle this head on. Recently, Jim Edman, BIT Chief Information Security Officer, spoke to a large group within the state about cybersecurity and how you can be protected. These types of open forums are a key part to raising awareness on this issue.Training
No country, industry, community, or individual is immune to cyber risks and many cyber-attacks begin with something called a phishing email. This is a fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card information by disguising oneself as a trustworthy entity. Not too long ago, these types of emails were easy to catch. Remember the email notifying you that you are related to an Egyptian Prince and he has left you $25,000. All you needed to do was provide your bank information and the money would be directly deposited. That's not the case anymore and phishing emails have become very convincing. Below are a few examples of some phishing emails that you may have seen in your inbox.Both examples may look like valid emails and most email users aren't going to know the areas to check prior to clicking a button. This is where training comes into play. With some minor training and tools, you can instantly protect yourself from these hackers.
Areas to Check Before Clicking
You'll notice phishing emails increase when emotional events are taking place. For example, election time, natural disasters or socially sensitive topics. This is because the hackers want you to be so emotionally attached to the topic that you immediately click on the button without thinking about it being a suspicious email. The easiest tool you can use right now to protect yourself is to slow down. Take a few seconds to skim the email and follow the best practices below.- Watch for emails that provide free information or free offers by clicking on a link.
- Scroll over the button and see where the hyperlink is directing you. Does the URL address have anything to do with the subject of the email?
- Check the wording of the email. Does is flow smoothly or is it missing words such as "the" within the sentences.
- Watch for updates on events. Has the event even happened yet? In today's world, we rely on instant information and hackers will use this to their benefit. Phishing emails will go out giving you an update on an event that hasn't happened yet. Check the email to make sure the content is relevant.
Helpful Tips
✰ SLOW DOWN. Be smart about your email. A few seconds is all it takes to scan your email.
✰ BUTTONS. Scroll over the link and check the URL address.
✰ CALL. If you are ever in question about an email, call the person it came from and ask.
✰ REPORT. If you receive a suspicious email, forward it to ReportSpam@state.sd.us.
Providing RESOURCES. Creating COMMUNICATION. Sharing SUCCESS.
