You are here: Home

OlympusNet News

by admin last modified Oct 18, 2017 10:10 PM
KRACK Wi-Fi Attack
See the link under Security on the left side of this page.
Apple will release updates in the coming weeks for its modern macOS and iOS devices. Windows 10 has been updated for those who automatically update. Owners of out of date devices and anyone who travels should consider using a VPN such as Private Internet Access

New phone system
OlympusNet switched to a new phone system several weeks ago. The new system will improve your access to our support staff for the services we'll support early in 2018. We believe the new system will be the best phone system available. It was released this spring by a large company and its development is ongoing.

Thoughts on October's OUCH! on Helping Others Secure Themselves
Our calling is increasingly to help others secure themselves —Ned Schumann 

SANS OUCH! for October: Helping Others Secure Themselves
Many of us feel comfortable with technology, to include how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused, intimidated, or even scared by it. This makes them very vulnerable to today’s cyber attackers. Cyber security does not have to be scary; it ’s actually quite simple once you understand the basics. They most likely just need a guide like you to help them understand the basics.

Five Simple Steps
Here are five simple steps you can take to help others overcome those fears and securely make the most of today’s technology. For more information on each of these points, refer to the References section at the end of this newsletter.

Social Engineering: Social engineering is a common technique used by cyber attackers to trick or fool people into doing something they should not do, such as sharing their password, infecting their computer, or sharing sensitive information. This is nothing new. Scams and con artists have existed for thousands of years. The only difference now is bad guys are applying these same concepts to the Internet. You can help others by explaining to them the most common clues of a social engineering attack, such as when someone creates a tremendous sense of urgency, when something is too good to be true, or when a cyber attacker pretends to be someone you know but their messages don’t sound like them. Share examples of common social engineering attacks, such as phishing emails or the infamous Microsoft tech-support phone calls. If nothing else, make sure family members understand they should never give their password to anyone or allow remote access to their computer.
Passwords: Strong passwords are key to protecting devices and any online accounts. Walk your family members through how to create strong passwords. We recommend passphrases, as they are the easiest to both type and remember. Passphrases are nothing more than passwords made up of multiple words. In addition, help them to install and use a password manager. It is important to have a unique password for each of your devices and accounts. If a password manager is overwhelming, perhaps teach them to write their passwords down, then store those passwords in a secure location. Finally, help them enable two-step verification (often called two-factor authentication) for important accounts. Two-step verification is one of the most effective steps you can take to secure any account.