September 24, 2014 by The GLS Team
The number of children who own a mobile phone has grown exponentially. While this is arguably a good thing, it also presents various safety issues that parents and children need to keep in mind. Following are some important pointers regarding mobile security for school children for your consideration.
Securing the Device
Because mobile phones are both small and valuable, they are a very attractive target for thieves. Children should be taught to never put their phone in a back or even side pocket. A front pocket, when possible, is an ideal option. If the phone is placed in a purse or backpack, children should never let the bag in question out of their sight.
Locking the Device
Teach children how to choose a secure yet easy-to-remember password for their mobile device. This password should include at least one number and/or symbol. Children should always lock their devices when not in use; this prevents a thief from gaining access to important personal information even if the phone is stolen.
Set Cyber Security in Place
As most parents know, the internet is full of harmful sites to which children should not be exposed. Use parental controls on the phone to limit what children can access and/or share. Tell your children what is being filtered and why, so they understand the importance of not getting on forbidden sites.
Keep Tabs on Social Media Activity
Parents have both the right and responsibility to see what their children are posting and sharing, and should not hesitate to ask children to take down inappropriate posts. It is also important for parents to explain to children what is and is not appropriate to say online. These rules, and the reasons for them, should be very clear.
Additionally, parents will want to check the security settings on a child's social media accounts to ensure that only trusted friends and relatives have access to a child's social media profile. Children should also be taught not to friend or invite people they do not know in person.
Keep Tabs on Texting
Teach your children that they should never use texting to bully others and/or communicate with strangers. If you are suspicious about a child's texting activity, ask the phone company for the records of calls made to and from the child's number.
Parents also need to be aware of exactly how much personal data is on a child's phone. Remember, a stolen phone could be more than just a financial loss; it could, in fact, tell a pedophile your child's full name, where he or she lives and goes to school, and other personal information.
While a strong password will, in many cases, prevent someone from accessing your child's personal information, it is also important to teach a child to be careful regarding what is and is not kept on a mobile phone. Parents should carefully assess all documents, photos, videos and other files on the phone and determine which ones would be best moved to the child's computer at home.
Parents who give a child a mobile phone need to teach the child how to use the phone in an appropriate manner and keep it secure at all times. At the same time, parents also need to supervise a child's usage of the phone and investigate and deal with infractions of the rules and/or suspicious activity. Those who are not familiar with the various aspects of mobile phone security may want to consider a training course such as those offered by Global Learning Systems, as being aware of the security implications of owning and using a mobile device can mean the difference between keeping kids safe and exposing them to multiple, unforeseen dangers.
September 22, 2014 by Eric Cates
How to Keep your information Safe When Traveling Abroad (This Post Follows, Travel Security Part One- Stay Protected When Traveling)
When traveling, always be aware of your surroundings. Most travelers are so focused on where and when their next meeting is, viewing the sites, getting baggage, or simply making the next flight, that they do not pay attention to the risks that surround them.
Traveling abroad can also lead to jet lag, less sleep, strain and fatigue mentally and physically, making you more vulnerable to potential security threats. Below, I provide some tips to stay protected in every stage of your trip.
Get accustomed to the local laws and customs before you pack your bags and board the plane. When traveling to a different country, laws differ and local customs become your most important guidelines. Know what the dress standards, communication laws and curfews.
The last thing you want is unwanted attention so be conscious of the clothing you wear and the belongings you keep on your person. For example, a laptop in a fancy case with your company’s business name or logo on it may be a targeted item. Carry minimal cash and do not bring unnecessary credit cards. The less value you keep on you the less important you become to thieves.
You Made it!
One of the most important items you need to protect is your passport. Keep your passport in a front pocket or a hidden pocket on your body where the likelyhood of being pick pocketed is less likely. Also, some hotels will allow you to store your passport in a secure place and will register your identity with the local police in case of an incident. Do not leave your electric devices unattended and be aware of what networks and Wi-Fi connections you use.
Protection of privacy varies from country to country and the majority of the information you send electronically can and will be intercepted. This is a valuable lesson to learn because when your travel purpose is primarily for business, thieves will target your information to infect not just you but the information pertaining to your company. This can result in losses. Lastly, keep a low profile. Some feel this is the smartest way to keep yourself safe and under the radar of thieves, terrorists and common criminals. Do not bring attention to yourself.
Before you pack your bags and prepare for a long flight home, make sure you have all of your belongings. This includes, your passport, electronic devices, cash, credit cards, any alternative ID’s and be sure that you review your system access with your company’s Information Security Officer.
Information that has been lost or unaccounted for should be investigated. According to the US Department of Justice, attackers are hunting for customer data, employee data, phone directories, computer access, computer network design investment data, passwords and much more. Make sure you go home with everything you came with.
September 17, 2014 by Carsen
Stay Protected from Phishing (One of Today’s Most Common Threats)
Recent reports highlight the need for education on phishing––one of today’s most common threats. Anti-phishing training combined with simulated attacks can help staff learn to recognize and detect such threats and how to take action. Why should you consider training your organization?
Here’s a start to justifying your program:
The Anti-Phishing Working Group Phishing Activity Trends Report for Quarter 1 of this year found the following:
Number of unique phishing web sites discovered in this quarter was 125,215.
“As Q1 levels are typically lower than what we see later in the year, we expect this to be a very active year for phishers worldwide,” said Frederick Felman, chief marketing officer, MarkMonitor.
A total of 557 brands were targeted by phishers in Q1. This was up from the 525 targeted in the fourth quarter of 2013.
Though phishing is a global threat, the United States continued to be the top country hosting phishing sites during the first quarter of 2014.
“Companies should consider intensifying employee training to combat the increasing craftiness of phishers who are working harder to obtain personal details on targets in order to trap them in scams,” CSO Online’s Antone Gonsalves recently reported.
The article also noted that sophisticated tactics used by phishers means companies need to increase employee education to reduce the amount of people who take the bait as well as to create a culture change to prevent attacks from affecting the organization.
What are your Options?
We recommend an interactive, anti-phishing awareness course like our’s here. This combined with social engineering testing services (simulated attacks/exploitations), provides an interactive and educational way to teach users how to recognize and respond to attacks as well as tests them to see how they respond. It is our goal to change behavior and foster a security-minded culture where individuals quickly recognize phishing attacks and do not click on malicious links, websites, attachments, etc.
We partner with our clients to tailor these services and determine the best approach for their organization. For more information contact us here.
We have also created security short videos like this one to help learners quickly learn about various security threats. Check out and share our Phishing Security Awareness Shorts below:
Email Phishing Security Short- What is Email Phishing?
Phishing Awareness- SMiShing (SMS Phishing)
September 09, 2014 by The GLS Team
Summer should be a time for relaxation. It is certainly the most popular time of year for vacations, time off and generally enjoying life. Unfortunately, the world doesn't stop turning just because it has gotten warm out - and those who seek to harm you are just as likely to do it during the summer as any other time of the year.
It is incredibly important that you remain vigilant in regard to your cyber security throughout the year - after all, you never know when an attack will occur. Recent news certainly shows that data thieves don't adhere to a specific schedule.
Heartbleed and Website Vulnerability
You only have to look back to the spring to see that nice weather doesn't deter cyber-criminals. The Heartbleed bug wreaked havoc with major web players who should have known better - and their mistakes very well could have cost users. You can look to some of those major players as examples of what to do when you know you have poor online security - companies like Google and Yahoo fixed their issues as soon as they were apparent, helping to make sure their users wouldn't suffer. As a consumer, you need to be even more proactive. Seek out any holes in your data security and make sure your system cannot be breached. It is up to you to retain awareness of your security, even if that means putting in a bit of extra effort.
The Russian Username Heist
Russian hackers stole over one billion usernames and passwords this summer in an astounding bit of cyber-crime that impacted almost half a million websites. These were not your average online criminals, of course, but they did take advantage of some of the same lax security measures that even the average data thief might use to get your data. Not only was the security on these sites particularly poor, but recent information has shown that the bulk of the impacted sites are just as vulnerable today as they were when the data was stolen.
What does that mean for you? That means you have to take action to make sure that your information remains safe. Even if you have been the victim of an online attack, you have to go back and make sure that you take care of the root of your problems. Failure to do so will leave you vulnerable for future attacks.
There's no time when you can let your guard down about your personal information. Try to avoid the mistakes of major companies and organizations and guard your data zealously. Always be on the lookout for holes in your security, fix problems when you can find them and always go the extra mile to stay safe. Doing so might take extra work, but it is far easier than trying to put your life back together after your personal information has been stolen.
September 03, 2014 by Carsen
We are excited to announce that we are a finalist in the Best of Elearning! 2014 Awards in the Best Compliance Training category for our Awareness Training Programs. These awards are hosted by the Elearning! Media Group and are solely based on user votes, so we want to show our appreciation to our customers.
Thank you all for your continued support, and we enjoy providing you effective and innovative awareness training programs. For more information on our security awareness training, anti-phishing training and other awareness programs, click here.