Saturday, May 17, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Avoid Tricks With These Tips — Cybersecurity Awareness 2021

SBN

Avoid Tricks With These Tips — Cybersecurity Awareness 2021

by Matt Keil on October 8, 2021

It is somewhat apt that October is cybersecurity awareness month, given the spooky nature of Halloween and the actions of malicious actors hiding in the shadows. We asked some of our team members battling ATO attacks for our customers for tips they might provide friends and loved ones. Here are the top ten tips for Cybersecurity Awareness 2021.

  1. Use Multi-Factor (aka MFA or Two-Factor) Authentication: Enabling multi-factor authentication for your application and website accounts dramatically reduces the likelihood that your account will be hacked. With multi-factor authentication turned on, a bad actor would have to also have access to your authentication method in order to gain access to your account. The types of authentication methods vary from app to app and site to site – some may allow you to select from multiple options like SMS text message, using the Google Authenticator app, or a soft token (or software token).
  2. Use Unique Passwords for Every Account: Bad actors know that people love to reuse passwords across online accounts and applications. Fortunately for them, there are billions of userID/Password combinations for sale (and for free) from the continuous stream of data breaches. With stolen credentials in hand, they count on our bad habit of password reuse and they’ll test out your password (along with all of the other most popular passwords) to see if they can get into your account. (This is called credential stuffing.) This is why it’s important to use unique passwords for all of your accounts, making password managers a necessity.
  3. Use Strong Passwords: Password123, 123456, Qwerty, LiverpoolFan, These are all examples of weak passwords, which bad actors will try first to see if you resorted to using a commonly compromised password creation pattern. Using these weak passwords makes it possible for even beginner hackers to get into your account in seconds.
    When creating your password, avoid using your birth year (or another year with special meaning), family or pet names, the city where you live, and the names of your favorite sports teams. These are all easily discovered through your social media or guessed based on other demographic signals. And simple number/symbol substitutions like p@ssw0rd are quickly cracked. (Sorry!) The longer the password the better – and the best password is one that you can’t remember (unless you have total memory recall). Again, that’s why you need that password manager.
  4. Use a Password Manager: If you’re going to follow the best practices of using unique, strong passwords on all your accounts, using a password manager is pretty much a necessity. It will help you create strong passwords and store them with encryption, and many will even facilitate Autofill into login fields. And, if you need to share your HBOMax password with your family, (a no-no that many ignore), many password managers have family accounts so you don’t have to dumb down the password or send new passwords over email or text (a really bad idea). My favorite password manager is 1Password, but there are some newer free ones available – like Myki — that look good, too.
  5. Don’t Save Passwords in Your Browser: Every web browser makes it possible for you to store your passwords – they’ll even prompt you to store them as you’re logging into new sites or apps. Similar to password managers, they’ll also offer up suggestions for strong passwords as you’re creating new login credentials. The problem, however, is that those passwords are most likely stored on your computer in an unencrypted form – meaning that if someone steals your laptop, they could get access to all your online accounts. This is why dedicated password managers are preferred. However, if you have to make a choice between using your browser’s password manager or using weak passwords, opt for stronger passwords (created by the browser) every time!
  6. Be Careful About the Emails You Click: Bad actors will often use email as a way to get access to your account information. I’ve known too many people who have gotten emails from their favorite retailers – only to realize later that it didn’t actually come from that retailer, but rather a bad actor. These bad folks hope that you’ll click a link on the email which takes you to a faked account login screen where they can then capture your login details. As a best practice, retailers typically never ask for personal information such as login details or passwords in email communications or on the phone. If you get a message that asks you to log in (or if a customer service rep asks you for this information) it is likely an attempt to steal your data. Look closely at where the email is coming from – if it is an Amazon email, look to see if it is originating from amazon[.]com; read the email closely – are there obvious grammar and wording errors. If you think it’s legitimate, open a new browser window and log in to your Amazon account directly to check error status.
  7. Check to see if your account password has been breached (change it if it has been): Use Have I Been Pwned? to find your information in old data breaches. This is a scary thing to do, but helpful to understand your exposure. Obviously, if your information is there, make the necessary adjustments.
  8. Don’t Save Credit Cards in Your Online Accounts: Storing credit card information in your online retail accounts and subscriptions may seem like a timesaver, but that also makes it easy for an attacker who has gained access to your account to run up a credit card bill, too. Think about all the time it would take to deal with the fraudulent charges that a bad actor could run up – the extra 30 seconds it takes to enter in your credit card pales in comparison. And, if you’re using a password manager, you can store your credit card information there which makes it easy to copy and paste your numbers when you’re checking out.
  9. Don’t fall for “Pay me with a gift card!”: This is a well-known, yet still a wildly successful tactic that commonly targets older, or less technically savvy folks. Either via email, phone, or both, the bad actor convinces you that you need to pay them to fix your (not) broken computer, or update a software subscription. Preying on fear and lack of technical acumen, the bad actor gains access to your computer, installing a remote access tool, which is then removed only after you pay them – in gift cards. It’s so common that Apple has placed a limit on in-store gift card purchases.
  10. Don’t respond to demographic quizzes/polls on social media: These Facebook questions and quizzes look to be data gathering for a report but in reality, are often designed to farm demographics and steal password hints. Bad actors establish a fake account, use automation to gain a following, and then begin posing questions, polls and quizzes, based on the interests observed. Don’t fill them in.

 

 

Techstrong Gang Youtube
AWS Hub

The post Avoid Tricks With These Tips — Cybersecurity Awareness 2021 appeared first on Cequence.

*** This is a Security Bloggers Network syndicated blog from Cequence authored by Matt Keil. Read the original post at: https://www.cequence.ai/blog/avoid-tricks-with-these-tips-cybersecurity-awareness-2021/

October 8, 2021October 8, 2021 Matt Keil account takeover, Cybersecurity Awareness Month, News and Trends
  • ← Software Supply Chains: an Introductory Guide
  • Cybersecurity News Round-Up: Week of October 4, 2021 →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations
Is DevEx the Same as DevSecOps?

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

GenAI’s New Attack Surface: Why MCP Agents Demand a Rethink in Cybersecurity Strategy
Encrypt AI, Protect Your IP: DataKrypto Tackles the LLM Security Crisis While Redefining What Encryption Should Be
As US CVE Database Fumbles, EU ‘Replacement’ Goes Live
CISO Survey Surfaces Shift in Application Security Responsibilities
Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)
News Alert: INE Security outlines top 5 training priorities emerging from RSAC 2025
Microsoft’s May 2025 Patch Tuesday Addresses 71 CVEs (CVE-2025-32701, CVE-2025-32706, CVE-2025-30400)
The Security Gap JPMorgan Chase’s CISO Didn’t Mention — And Why It’s in Your Browser
India-Pakistan Conflicts Escalating: Military Operations and DDoS Attacks Making Targeted Strikes
CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution

Industry Spotlight

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty

May 16, 2025 Jeffrey Burt | Yesterday 0
Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)
Analytics & Intelligence Cloud Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

May 15, 2025 Richi Jennings | 1 day ago 0
As US CVE Database Fumbles, EU ‘Replacement’ Goes Live
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Industry Spotlight IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

As US CVE Database Fumbles, EU ‘Replacement’ Goes Live

May 14, 2025 Richi Jennings | 2 days ago 0

Top Stories

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
Cybersecurity Featured News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams

May 16, 2025 Michael Vizard | Yesterday 0
DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA
Cyberlaw Cybersecurity Featured Governance, Risk & Compliance Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA

May 15, 2025 Jeffrey Burt | 2 days ago 0
Apple Device Users Can File Claims in $95 Million Siri Spying Settlement
Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Mobile Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Apple Device Users Can File Claims in $95 Million Siri Spying Settlement

May 13, 2025 Jeffrey Burt | 4 days ago 0

Security Humor

A spider from above

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×