Skip Ribbon Commands Skip to main content
Cybersecurity Awareness Month

Cybersecurity Awareness Month Archives

In support of National Cyber Security Awareness Month which aims to raise awareness about the importance of cybersecurity, IASE will feature several relevant topics throughout the month. Check back weekly for articles, tips or “knowledge checks” that relate to aspects of our daily lives at work or home to help you become #CyberAware!

​2018 Archives


  1. Stop and think before you open attachments or click links in emails. If it looks suspicious, it's best to delete it.
  2. Make electronic and physical back-ups or copies of all your important work.
  3. In order to prevent theft and unauthorized access, never leave your laptop or mobile device unattended in a public place and lock your devices when they are not in use.
  4. Use passwords that are at least eight characters long and a mix of letters, numbers, and characters. Do not share any of your usernames or passwords with anyone. When available, turn on stronger authentication for an added layer of security, beyond the password.
  5. Report anything suspicious. If you experience any unusual problems with your computer or device, report it to your IT Department.


  1. Enable stronger authentication: Always enable stronger authentication for an extra layer of security beyond the password that is available on most major email, social media and financial accounts.
  2. Make your passwords long & strong: Use complex passwords with a combination of numbers, symbols, and letters.
  3. Keep a clean machine: Update the security software, operating system, and web browser on all of your Internet-connected devices.
  4. When in doubt, throw it out: Links in email and online posts are often the way cyber criminals compromise your computer. If it looks suspicious, delete it.
  5. Share with care: Limit the amount of personal information you share online and use privacy settings to avoid sharing information widely.

​2017 Archives

Week 1 - Simple Steps to Online Safety

Which of these precautions can you take to make your family safer from online threats?

  • Always keep anti-virus software current.
  • Regularly apply any available updates and patches for your home computer.
  • Have regular conversations about phishing and other online threats.

Answer: All choices are correct.

All members of the public can take some basic actions to protect themselves online and to recover in the event that a cyber incident occurs. Being alert for phishing emails, applying any updates for your computer system, and keeping your anti-virus software current are all valuable precautions to take to not become a victim of cybercrime.

Week 2 - Cybersecurity in the Workplace is Everyone's Business

Select the possible, detrimental actions that can occur as a result of a single phishing attack:

  • The adversary can steal files with sensitive data.
  • Computer virus could be released onto the network.
  • The adversary can establish a remote connection.
  • All of the choices are correct.

Answer: All choices are correct.

A single phishing attack can lead to many negative effects. These include stolen files and sensitive data, the collection of PII, the execution of remote commands, and the advisory establishing remote connections to an official network. It is important to recognize phishing attempts to minimize the likelihood of being attacked and the loss of data. Always look for digital signatures on DoD enterprise email. Never open links or attachments within questionable emails and immediately report potential phishing emails to your organization's Security Officer.

Week 3 - Today's Prediction for Tomorrow's Internet.

Internet of Things (IoT) devices are becoming a feature of everyone's daily life. What cybersecurity precautions should you keep in mind in using IoT devices?

  • Make sure you understand the cybersecurity vulnerabilities for each IoT device.
  • Learn how to set the IoT devices for the maximum cybersecurity protection.
  • Make sure you know the cybersecurity features available for each device (i.e., security settings/patches/upgrades).

Answer: All choices are correct.

People today are in the midst of an enormous technological change that will change our lives drastically forever! Technological devices affecting almost every part of our lives are here, from household appliances to aircraft. Automated sensors and controls that we interact with daily have become known as part of the Internet of Things (IoT), used to secure our homes, adjust home temperatures from afar, monitor our health/fitness, and control smart buildings. Using this technology comes with great risk. Malicious use of these devices can cause harm. We could be in a position where a determined adversary could shut down our power and water infrastructure, turn off security systems, disrupt our ability to provide medical care, listen to our conversations, and monitor our movements.​

Week 4 - The Internet Wants YOU! Consider a Career in Cybersecurity

No question week 4.

Week 5 -  Protecting Critical Infrastructure from Cyber Threats

When is it acceptable to plug a personally owned device into a USB port on government provided equipment?

  • Anytime, as long as it's a keyboard or mouse.
  • Anytime, as long as it's only for charging purposes.
  • Anytime, but only for Flash memory backup devices.
  • Never (unless specifically authorized by the Authorizing Official (AO) through the responsible Information Systems Security Manager (ISSM))
Answer: Never.

Removable media devices are portable and can be used to easily move data between computers. The DoD requires DoD data stored on removable media devices to be encrypted and stored according to its classification level. Only removable media devices that have been specifically authorized by the AO through the responsible ISSM can be plugged into a USB port of a government owned system.