Do you Know What Day Today Is?

by in , , , , , , , , , , 0

There are all sorts of days to celebrate during the year such as Mother's Day and Father's Day, and even some more off-the-wall days such as National Fried Chicken Day, Talk Like a Pirate Day, and a personal favorite, National Pancake Day.  But today is an extra special day that should be added to everyone's calendars.  Today is International Password Day!

International Password Day gives us all the opportunity to stop and reflect on what makes a good password, and how we can best protect our work and personal data by using strong password concepts.

To help you along, there's even a website dedicated too helping you figure out what makes a good password, how to deal with keeping track of the never ending list of passwords, mobile device passwords, and even some funny stories about password catastrophes!

Please take the time in joining your information security team in making every day a strong password day!

Don't be a victim of identity tax theft! The IRS is helping to protect false tax claims.

by in , , , , , , , , , , 0

One of the hot identity theft scams is submission of false tax returns in order to receive unearned or earned refunds. The IRS has a process to try and detect these false returns. If they suspect a false return they will mail a letter to the address the taxpayer listed in their previous year return. The IRS letter directs the taxpayer to visit an IRS site to verify the tax return submitted. Legitimate letters should direct taxpayers to More details are contained in this link:

The IRS also has a great website page detailing active tax scams:

If taxpayers suspect they are a victim of tax fraud/identity theft, they should contact the Treasury Inspector General for Tax Administration at 1-800-366-4484 or via the web at:

Taxpayers can forward scam emails to

Adobe Flash Player Exploit Found - What you can do protect your systems.

by in , , , , , , , , , , 0

Adobe is aware of reports that an exploit for CVE-2015-0310 exists in the wild, which is being used in attacks against older versions of Flash Player. Additionally, Adobe is investigating reports that a separate exploit for Flash Player and earlier also exists in the wild. For the latest information, please refer to the PSIRT blog here.  You may find more information about the Adobe Security Bulletin here.

Here are instructions on how to disable Adobe Flash in current browsers. If Flash is disabled, it can be temporarily re-enabled if needed. Follow the steps for all browsers used. If you use multiple browsers it may be simpler to uninstall Adobe Flash:


  1. On the Firefox tool bar go to Tools 
  2. Select Add-ons 
  3. In the Plugins tab, set Shockwave Flash to Never Activate 
  1. On the Safari tool bar go to Safari > Preferences… 
  2. In the Security tab, ensure Allow Plug-ins is checked 
  3. Click on the Manage Website Settings… button 
  4. Select Adobe Flash Player 
  5. In the dropdown, select When visiting other websites: Block 
  6. Click on the Done button 
  7. Close the Preferences dialog box 
  1. Type chrome:plugins in the address bar to open the Plug-ins page 
  2. On the Plug-ins page that appears, find Adobe Flash Player 
  3. Click the Disable ​link under its name 


  1. Go to the Firefox menu button 
  2. Select Add-ons 
  3. In the Plugins tab, set Shockwave Flash to Never Activate 
Internet Explorer
  1. Click the Tools button, and then click Manage add-ons 
  2. Under Show, click All add-ons, and then select Shockwave Flash Object 
  3. Click Disable, and then click Close 

  1. Type chrome:plugins in the address bar to open the Plug-ins page 
  2. On the Plug-ins page that appears, find Adobe Flash Player 
  3. Click the Disable ​link under its name

Tax Identity Theft Awareness Week Begins Today!

by in , , , , , , , , , , , , , , , , 0

Two Ways Tax Scammers Might Target You

It’s that time of year — tax time. It’s also a great time to get up to speed on tax-related scams. Here are two ways tax scammers might target you:

Tax identity theft

This kind of identity theft happens when someone files a fake tax return using your personal information — like your Social Security number — to get a tax refund or a job. You find out about it when you get a letter from the IRS saying:

  • more than one tax return was filed in your name, or
  • IRS records show wages from an employer you don’t know
If you get a letter like this, contact the IRS Identity Protection Specialized Unit at 800-908-4490. You can find more about tax identity theft at and

IRS imposter scams

This time scammers aren’t pretending to be you — they’re posing as the IRS. They call you up saying you owe taxes, and threaten to arrest you if you don’t pay right away. They might know all or part of your Social Security number, and they can rig caller ID to make it look like the call is coming from Washington, DC – when it could be coming from anywhere. Leaving you no time to think, they tell you to put the money on a prepaid debit card and tell them the card number right away.

The real IRS won’t ask you to pay with prepaid debit cards or wire transfers, and won’t ask for a credit card number over the phone. When the IRS contacts people about unpaid taxes, they usually do it by mail.

If you have a question about your taxes, call the IRS at 800-829-1040 or go to You can report IRS imposter scams to the Treasury Inspector General for Tax Administration (TIGTA) online or at 800-366-4484, and to the FTC at

Social Engineering: The Basics

by in , , , , , , , , , , , , , , , , 0

What is social engineering?  What are some of the most common tactics used.  Here's a short guide on how you lessen your likelihood of becoming a social engineering statistic.

January 2015 - secureCI Monthly Newsletter

by in , , , , , , , , 0

secureCI presents Ouch!

The SANS Monthly Information Security Bulletin at Channel Islands

Securely Using Mobile Apps
In This Issue…
  • Overview
  • Obtaining Mobile Apps
  • Permissions
  • Updating Apps

Chris Crowley is an independent consultant, certified SANS instructor and course author.  He is active on Twitter @CCrowMontance and on Google plus: +Chris Crowley

Mobile devices, such as tablets and smartphones, have become one of the primary technologies we use in both our personal and professional lives. What makes mobile devices so versatile are the millions of apps we can choose from. These apps enable us to be more productive, instantly communicate and share with others, train and educate or just have more fun. However, with the power of all these mobile apps come risks. Here are some steps you can take to securely use and maintain your mobile apps.

Obtaining Mobile Apps
The first step is making sure you always download them from a safe, trusted source. Remember, just about anyone can create a mobile app, so you have to be careful where you get them from. Cyber criminals have honed their skills at creating and distributing infected mobile apps that appear to be legitimate. If you install one of these infected apps, these criminals can take control of your mobile device to read your emails, listen to your conversations and harvest your contacts. By downloading apps from only well-known, trusted sources, you reduce the chance of installing an infected app. What you may not realize is the brand of mobile device you use determines your options.

For Apple devices, such as an iPad or iPhone, you can only download mobile apps from a managed environment: the Apple App Store. The advantage to this is Apple does a security check of both the mobile apps and their authors. While Apple cannot catch all the bad guys or all the infected mobile apps, this managed environment helps to dramatically reduce the risk of you installing an infected app. In addition, if Apple does find an app in its store that it believes is infected, it will quickly remove the mobile app. Windows Phone uses a similar approach to managing applications.

Android mobile devices are different. Android gives you more flexibility by being able to download a mobile app from anywhere on the Internet. However, with this flexibility comes more responsibility. You have to be more careful about what mobile apps you download and install, as not all of them are being reviewed. Google does maintain a managed mobile app store similar to Apple’s, called Google Play. The mobile apps you download from Google Play have had some basic checks. As such, we recommend you download your mobile apps for Android devices only from Google Play. Avoid downloading Android mobile apps from other websites, as anyone, including cyber criminals, can easily create and distribute malicious mobile apps and trick you into infecting your mobile device. As an additional protection, consider installing anti-virus on your mobile device.

To reduce your risk even more, avoid apps that are brand new, that few people have downloaded or that have very few positive comments. The longer an app has been available or the more positive comments it has, the more likely that app can be trusted. In addition, install only the apps you need and use. Ask yourself, “Do I really need this app?” Not only does each app potentially bring new vulnerabilities, but also new privacy issues. If you stop using an app, remove it from your mobile device. (You can always add it back later if you find you need it.)

Finally, you may be tempted to jailbreak or root your mobile device. This is the process of hacking into it and installing unapproved apps or changing existing, built-in functionality. We highly recommend against jailbreaking or rooting, as it not only bypasses or eliminates many of the security controls built into your mobile device, but often also voids warranties and support contracts.

Once you have installed a mobile app from a trusted source, the next step is making sure it is safely configured and protecting your privacy. Installing and/or configuring mobile apps often requires that you grant certain permissions. Always think before authorizing any access, “Does your app really need those permissions to do its stated job?” For example, some apps use geo-location services. If you allow an app to always know your location, you may be allowing the creator of that app to track your movements; perhaps they can even sell that information to others. If you do not wish to grant the permissions an app is requesting, shop around for another app that meets your requirements. Remember, you have lots of choices out there. Apple devices allow some permissions to be changed in Settings or at runtime, such as access to geo-location information. Windows and Android mobile devices are different. They present you with an all-or-nothing approach. If you do not grant all of the specified permissions, you can’t install the app.

Updating Apps
Mobile apps, just like your computer and mobile device operating system, must be updated in order to remain current. Criminals are constantly searching for and finding weaknesses in apps. They then develop attacks to exploit these weaknesses. The developers that created your app also create and release updates to fix these weaknesses and protect your devices. The more often you check for and install updates, the better. Most platforms allow you to configure your system to update mobile apps automatically. We recommend this setting. If this is not possible, then we recommend you check at least every two weeks for updates to your mobile apps. However, when your apps are updated, always make sure you verify any new permissions they might require.

Securing the Human Blog
Be sure to frequent the STH Blog for recent articles and trends on security awareness. This month, we cover key topics for Electric Utilities. More at


Social Engineering:

Disposing Your Mobile Device:

Securing Your New Tablet:

Common Security Terms:

SEC575: Mobile Device Security Course:

OUCH! is published by SANS Securing The Human and is distributed under the Creative Commons BY-NC-ND 4.0 license. You are free to share or distribute this newsletter as long as you do not sell or modify it. For past editions or translated versions, visit Editorial Board: Bill Wyman, Walt Scrivens, Phil Hoffman, Bob Rudis

Can you spot the phishing scams and stay safe online this holiday season?

by in , , , , , , , , , , , , 0

For many people, the holidays means a dramatic spike in email traffic. There is more communication between family and friends, more solicitations from retailers pitching holiday bargains, and more online shopping confirmations and shipping notifications. It’s also a time of year when cyber-criminals try to take advantage of the overwhelming volume of email communications to catch unwitting victims off guard with phishing scams. Hopefully you would be able to spot a fake malicious email and avoid getting compromised, but don’t be too sure.  For additional information on how to stay safe please read on.