In honor of National Cyber Security Awareness Month, we asked David Whipple, PhD, adjunct professor in Drexel's MS in Cybersecurity program and Steven Weber, PhD, professor in the College of Engineering, about cybersecurity and its omnipresent role in our lives.
Generally speaking, we are usually unaware of the full digital footprint we leave behind in cyberspace. From social media to email to internet browsing, our daily digital activity can leave us vulnerable.
“The devil is in the details,” says Weber, emphasizing the fact that we often overlook the fine print and are completely unaware of where our personal information can go.
For example, free email services collect
information that can be vulnerable to mass
hackings; while websites and cloud-services providers have varying policies
that, in many cases, allow
our data to be sold to third-parties, often
without our consent.
With the explosion of IOT—the ‘Internet of Things’—more devices use internet connectivity to function, leaving us even more susceptible to cyber concerns.
While university researchers, government bodies and various industry representatives are analyzing the future of cybersecurity, it’s also up to individuals to maintain their own safety, to a certain degree.
In the United States, federal policies don’t always protect the user, and even in the majority of workplaces, cybersecurity remains a big question mark, according to Whipple. So start practicing good ‘cyber hygiene’ with these tips below.
“Basic steps to detect phishing email include carefully looking at the ‘from’ email address and the web address (URL) of any links in the message. Also, be very careful of opening attachments—never open attachments sent to you by unknown parties, and be extra careful to check the legitimacy of a message asking you to open an attachment. Finally, never send passwords over email.” (Weber)
“Use a unique password for every account that you have. Use something that’s at least eight characters long, no word that is found in the dictionary; use uppercase, lowercase and special characters.” (Whipple)
“Any time you can go to a two-factor authentication system, you’re better. A password and your username can be passed around to other people—the two-factor authentication system can’t.” (Whipple)
Weber urges users to report cybercrime to the United States Department of Justice Computer Crime and Intellectual Property Section (CCIPS).
“We live in a rapidly changing landscape in terms of convenience, security, and privacy,” says Weber.
On one hand, instant gratification in the
digital world is now an expectation; on the other hand, this looseness of trust
is quite possibly our biggest downfall.
The key is responsible caution.
“You don’t know what the other person’s capable of until you get to know them,” says Whipple. “You have to have a respect of boundaries. Respect yourself.”
For more tips, see the Department of Homeland Security’s website.