Cyber & IT Supervisory Forum - Additional Resources

TLP:GREEN

Opera 71 Safari 72 Edge 73

 

Browser Privacy Control

URL

Apple Calendar (Share Calendars)

https://support.apple.com/kb/PH2690?locale=en_US

Apple Calendar (Stop Sharing Calendars)

https://support.apple.com/guide/icloud/stop-sharing-a-calendar mm6b1a8f9f/icloud

Phishing Resources Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. These emails often attempt to entice you to click on a link that will take the user to a fraudulent website that appears legitimate. The user then may be asked to provide personal information, such as account usernames and passwords, which can further expose them to future compromises. Additionally, these fraudulent websites may contain malicious code. 74

Resources

URL

Avoiding Social Engineering and Phishing Attacks

https://www.cisa.gov/uscert/ncas/tips/ST04-014 https://www.cisa.gov/uscert/ncas/tips/ST04-013 https://www.cisa.gov/uscert/ncas/tips/ST05-010 https://consumer.ftc.gov/features/identity-theft https://www.cisa.gov/uscert/security publications/recognizing-and-avoiding-email-scams

Protecting your Privacy

Understanding Web Site Certifications Federal Trade Commission, Identity Theft Recognizing and Avoiding Email Scams

7.6.1 Securing Your Personal Email Address Create unique disposable email addresses for different online accounts. It is also highly recommended that you create a separate email address when opting out of your Digital Exhaust.

This can be read about at this URL 75 .

7.6.2 Checking URLs in Emails Hyperlinks in email can often connect to a web domain different from what they appear to be. Some links may display a recognizable domain name, but, in fact, direct the user to a different, malicious domain. Threat actors also use international character sets or misspellings to create malicious domains that is those of well-known brands. 76 You are encouraged to always review link contents by hovering the mouse pointer over the link to see if the actual link is different from the displayed link. The resources below will also aid you in making informed decisions when receiving links in emails. Checking Shortened URLs One clue that a link in email may be dangerous is that the URL seems too short. While link-shortening services such are popular and common tools for creating shorter links, threat actors also use link 7.6.2.1

TLP:GREEN

Made with FlippingBook Annual report maker