Cyber Security Awareness

Cyber Security is our responsibility.

Airmen, civilians and contractors must do their part to maintain situational awareness, maintain training requirements, and think creatively in planning, managing and conducting effective cyber operations, in order to protect the Nation and the Air Force's five core missions:
1. Air and Space Superiority
2. Intelligence, Surveillance, and Reconnaissance (ISR)
3. Rapid Global Mobility
4. Global Strike
5. Command and Control in and through cyberspace

2018 National Cyber Security Awareness Month Presentations

Cyber Security References

From the first day Airmen put on the uniform, the Air Force enforces and re-enforces the necessity of good cyber hygiene through ongoing training.  Annual CyberAwareness training through the Air Force training site ADLS keeps Airmen vigilant and reminds them of the daily threats to the Air Force’s cyber culture.  

Airmen who want to know more about cyber security can find additional resources at the US-Cert NCAS website or “The Cyber Space” link maintained by the 24th Air Force.  Late in 2015, the Pentagon released the Department of Defense Cybersecurity Culture and Compliance Initiative.  DC3I outlines how the DoD plans to transform its cyber security culture by aligning cyber security strategy with future DoD cyber strategy.  From the bottom up the Air Force is committed to making cyber security the cultural norm.

https://golearn.adls.af.mil/kc/main/kc_frame.asp?blnWhatsNew=True

http://www.defense.gov/News/Publications

https://www.us-cert.gov/ncas

http://www.24af.af.mil/About-Us/The-Cyber-Space

 

Password Security

Take your password seriously.

Make passwords long and strong: Combine capital and lowercase letters with numbers and special characters to create a more secure password. Change any default passwords on your mobile device to ones that would be difficult for someone to guess.

Create a passphrase: Passwords can now be “mybosslikesreadingcartoonsinthenewspaper.”

Unique account, unique password: Use different passwords for different programs and devices to thwart cybercriminals. Do not choose options that allow your device to remember your passwords.

Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.

Get Two Steps Ahead: Turn on two-factor authentication – on accounts where available. Two-factor authentication can use anything from a text message to your phone to a token to a biometric like your fingerprint to provide enhanced account security.

October is Cybersecurity Awareness Month!

Signs of Phishing
Urgency:
Urges you to act quickly because your account may be suspended or closed.

Generic Greeting: Doesn't address you by name, but uses a generic greeting like "Dear valued customer."

Validate or Update Information: Asks for account numbers, passwords or other personal information.

Includes Errors: Contains misspellings or grammatical errors.

Unusual Content: Is from someone you know, but includes a strange subject line or unusual attachments.

Unknown Link: Contains links to unknown or suspicious websites.

Plausible Sender: Claim to be from your military service, government organization, Internet service provider or bank.

Fake Website: Direct you to a Website that looks real.

How to stay safe in cyberspace!

October is Cybersecurity Awareness Month!

At the core of today’s fast-paced world is the evolving cyber domain. Now, more than ever, Airmen use the Internet for personal pleasure and professional gain.

With information and entertainment easily accessible at a few taps of the fingertips, it is easy to fall prey to scammers and hackers if you lack cyber awareness. 

“As we discuss threats this National Cyber Security Awareness Month, we must remember the fundamental concept: a risk shared by one is a risk shared by all,” said U.S. Air Force Maj. Darris Johnson, 19th Communications Squadron commander. “If we apply this concept to our physical homes, we realize leaving the door unlocked, losing keys, and inviting strangers into our home is the equivalent to leaving an unattended computer with the user logged in, losing passwords and authentication credentials, and responding to phishing emails or communicating with unknown entities, leaves us vulnerable.”

Click here for the rest of the story.

Contact

AMC/A6OS
DSN 779-6298

www.stopthinkconnect.org

Personal Info!

Protect Your Personal Information

Personal Information Is Like Money. Value It. Protect It:  Information about yourself, such as games you like to play, has value ‒ just like money. Be selective with the information you provide to emails, apps, websites and social media sites.

Do not provide personal information: Make certain of a person’s or organization’s authority to have your Personal Identifiable Information (PII).

Guard your mobile device: To prevent theft and unauthorized access or loss of sensitive information, never leave your mobile devices–including any USB or external storage devices–unattended in a public place. Keep your devices secured in taxis, at airports, on airplanes, and in your hotel room.

Keep it locked: Get into the habit of locking your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or destroy your information.

Home Cyber Security

Good cyber security culture starts at home. The web offers numerous resources to assist all families in making cyber security a cultural norm at home.  Kids naturally love games, so www.GetGameSmart.com and www.WebWiseKids.org help kids and parents learn about staying safe online in a fun way. 

In addition, all adults can practice what they preach by reviewing the vast amount of information available on www.StaySafeOnline.org, and sharing their internet safety sources with their friends and family.

Other educational resource include:
www.GetNetWise.org, www.iKeepSafe.org, and www.WiredSafety.org