Welcome
Cyber Security Basics
Business Email Compromise (BEC) - when an attacker uses the identity of someone through impersonation or account takeover, then tricks the target into sending money into an account controlled by the attacker.
Multifactor Authentication (MFA) - using more than one factor to authenticate into an account. Usually this is in the form of something you know (like a password) plus something you have (like a RSA token or a cell phone). This is sometimes referred to as two-factor authentication (2FA).
Phishing - the fraudulent practice of sending emails to victims purporting to be from a reputable or familiar source. The goal is to induce the victim into revealing personal or financial information to the attacker. Most cyber-attacks are initiated through this method.
Cyber Security Best Practices for Individuals
- Use strong passwords & secret questions
- Two Factor authentication
- Operate using STANDARD USER privileges instead of the ADMINISTRATOR privileges
- Use a trusted VPN service
- Minimize connecting to untrusted WIFI access points
- Update your devices
- Use anti-virus and firewall software
- Do not open suspicious emails
- Lock down social media sites
- Do not download illegal software
What to do if you fall victim to BEC and money is wired to a fraudulent account
1. Request a wire recall from your bank IMMEDIATELY
2. Contact the FBI by submitting a complaint to www.ic3.gov