2021 Guide to staying safe online - You are the key to our cyber safety. Play your role - RMIT University
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Introduction Society’s continuing journey into an interconnected and digital world has transformed the way we work and play. We have embraced technology more than ever as the COVID-19 pandemic forced us to work, learn, study and engage socially through digital channels. The environment in which we operate has also changed, with more frequent and complex cyber threats. There are significant levels of illegal trade on the dark web, increased state-sponsored actors (hackers acting on behalf of a government) targeting critical infrastructure, international ploys to steal the intellectual property of organisations across the globe, and cyber criminals actively trying to steal identities, data and money. RMIT University has made significant investments in technologies and introduced many tools to protect your personal wellbeing as well as the University’s data and services. Staying safe online is key to the protection of our data and services; it is a shared responsibility where we all have a significant and ongoing role to play. This guide offers insight into the tools and good practices you can adopt to stay safe online. It will assist you to connect securely and guide you to act responsibly when using RMIT resources. Policy Pat will focus on acceptable use standards, from our Information Technology Policy, and will cover the mandatory security behaviours that must be followed by all staff and students when using the University’s technologies and services. Please familiarise yourself with the information in this guide, adopt our cyber safety standards and stay safe. Many of the tips in this booklet equally apply to your personal digital world, which also needs to be secure. Share your learnings with your friends and family. Thank you for playing your role in helping protect RMIT data and services. Together we can help fight cybercrime. Tony Aramze RMIT CISO 2
Learn how you can boost your cyber protection knowledge and skills through the information, advice and tips in this guide. 1 Case study: What could go wrong? 2 Passwords and authentication 3 Email security: Phishing and data loss prevention 4 Internet use: Safe connections, social media Securing, sharing and storing data: 5 OneDrive, SharePoint, Teams, Cloudstor 6 Remote working/learning/study 7 Personal devices 8 Mobile applications 9 International travel 10 Incident reporting and help 3
1 Case study: What could go wrong? Sarah was an active user of Instagram. she was a student at a large Australian She knew that her RMIT login password university. The format used for RMIT email needed to be one that was not used addresses was also easy to find. They tried elsewhere, but she was finding it too hard the Instagram password on Sarah’s email to keep up with all the various passwords account and bingo, they had access. across her accounts. Ignoring RMIT’s advice, she used her Instagram password A single compromised password can allow for her RMIT login password. other people to access your accounts if you have used the password elsewhere. Instagram suffered a data breach where Sarah’s behaviour jeopardised the usernames and passwords were leaked. It reputation of the University. The threat was headline news. Sarah quickly changed actors also made a ransom demand: the password to her Facebook site to stop unless the University made a significant random posts appearing under her name. payment within 24 hours it would lose A few weeks later, RMIT’s Cybersecurity access to critical information systems, Office was alerted that sensitive RMIT which would jeopardise the operations of data was for sale on the dark web and the University. found that Sarah’s account had been compromised. Don’t be like Sarah. Have a strong, unique password on your RMIT account and don’t The threat actors (bad guys) that hacked use your RMIT password anywhere else. Instagram had taken a little more time and These two actions are significant measures ran the Instagram passwords across other that will protect the University’s confidential accounts. A Google search and a look research, sensitive data and personal at her Instagram posts quickly provided information. PLAY YOUR ROLE. them with Sarah’s profile, including that 4
2 Passwords and authentication Like your front door key, which secures your personal items, a password is your key to securing your online world. The longer the password, the stronger it is. A passphrase or sentence, rather than a single word or random mix of letters, numbers and symbols, makes it harder for hackers to access your data. Top tips 5. Never share passwords or leave them on a sticky note. 1. Use a password manager. Passwords should never be shared and This is an app that helps you generate, certainly do NOT belong on sticky notes manage and store your passwords on your PC or in your wallet. securely. You only have to remember one password, which is used to access 6. Set up self-serve password reset the password manager. (SSPR) for your RMIT account. Setting up self-serve password reset 2. Turn on will make it easy for you to reset your Multi-Factor Authentication. password if you forget it or if ITS resets This will strengthen the security access it due to a cyber incident. Click here to to your Office 365, Google and any set up ‘self-service password reset’ on personal accounts or applications. This the RMIT staff or student website. security measure requires two or more proofs of identity before access 7. Check if your username and is granted to an account. password have been compromised in a data breach. Change your 3. Decline prompts to ‘save your password immediately if the search password’ on web pages. reveals any compromise on your This feature generally saves your accounts. https://haveIbeenpwned.com passwords in plain text and would allow an attacker easy access to your 8. Subscribe to ‘Notify Me’ passwords if your computer were The 'notify me' feature can be found compromised. on the 'haveIbeenpwned' site. You’ll receive an alert if any of your email 4. Cover the keypad. accounts or passwords are compromised When entering a PIN or password in so you can promptly change your public, cover the keypad. password. It’s like having an alarm on your home. If something is happening, you can be alerted to respond. 5
2 Passwords and authentication Make your password unique to your RMIT login; that means you don’t use that password anywhere else. The first thing a cybercriminal does upon cracking a password is to see what other apps it may give them access to. What does Policy Pat say ■ Minimum password length is eight characters, although he about passwords? recommends 13 or more for greater security. ■ Password complexity and the frequency that passwords must be changed are enforced by the RMIT identity system. ■ Accounts and passwords must not be shared. ■ Do not use your RMIT password on any other account. ■ Change your password immediately if you think it may have been breached. 6
3 Email security: Phishing Phishing – don’t bite the bait. Phishing catches innocent people all over the globe ■ Cybercriminals use social engineering click on an email link to download an – an assortment of malicious activities invoice – which can let them into our based on psychological techniques – to whole system! Students have received try to manipulate you into trusting them messages requesting them to open so you do what attachments. It’s important to be able to they want. identify when you are being phished. ■ ‘Phishing’ is a technique using emails, ■ RMIT uses filter tools to weed out texts, social media or telephone calls known phishing emails. However, no that aims to trick you into revealing tool is perfect. We must check every valuable data such as usernames, email before we respond or click on passwords, bank account and/or credit attachments within them. If an email card details. looks suspicious to you, then there’s a good chance it is. Don’t click on any ■ Emails are a primary method for links, do more in-depth checks, and phishing attacks against RMIT staff and if you have any doubt forward it to students. Cybercriminals have tried to reportphishing@rmit.edu.au. trick RMIT employees by having them Beware of scams A request to purchase multiple iTunes vouchers or Google Play cards is a common scam. Never purchase iTunes vouchers or Google Play cards from an email request sent to you without verifying the request via phone/SMS/chat to the sender. 7
3 Email security: Phishing Every email is a potential scam It’s important to know where and what to check in every email you receive. Check for these signs of phishing: ■ Any email requesting sensitive if the link in the text doesn’t match the information with a login link or URL displayed when you hover your attachment cursor over a link. If they are different, Legitimate companies will not send an it means you will be going to a different email requesting your tax file numbers, site, which is not what a reputable bank details or passwords. Be wary of organisation would be asking you updates to login information or requests to do. When you hover over a link, it to download files. Don’t disclose your should also always begin with https://. login details or personal information (e.g. However, phishing sites are now using passport, driver licence) TO ANYONE. https:// so be cautious and don’t base your decision on this point alone. Never enter your username and password into a website where you ■ Emails that are not personalised have been directed by a link in a and are requesting information or message, particularly email and SMS a response from you messages. Be wary of emails from organisations that know you but don’t refer to you by ■ Hyperlink URLs that don’t match name. Hackers sometimes use generic the organisation signatures to sign off on an email and Always check URLs before you click don’t include a person’s name and role. on them. Alarm bells should be ringing Report all phishing and phishing simulations immediately Forward all suspicious emails Practise your phishing awareness skills. received in your RMIT mailbox to Can you spot the real email from the reportphishing@rmit.edu.au scams (phishing)? If it is found to be malicious, our cyber phishingquiz.withgoogle.com experts will take the necessary action to contain the risk. cyber.gov.au/acsc/view-all-content/ programs/stay-smart-online/scam- messages/quiz 8
3 Email security: Phishing ■ The sender or organisation doesn’t ■ Emails with only an attachment have a legitimate domain name or a hyperlink in the body of the email The domain address is the part that comes after the ‘@’ symbol, e.g. Emails where little information, if any, @rmit.edu.au. Always check and is included in the body of the email verify the domain address of the is a sign that something is not right. sender’s email. An email requiring you to click on any link could download malware on your Then check their email address by computer or have you responding to a hovering your mouse over the ‘From’ fake web page. address. The email address and sender’s name should be identical. ■ Emails with unsolicited Phishing emails often have one letter attachments different between the two addresses, tricking us into thinking they are the Companies don’t typically send same address. It’s important to look emails with attachments. Emails from carefully. Although this is a good rule reputable organisations are more of thumb, it isn’t foolproof. Companies likely (although not always) to direct may use third party email providers you to download documents from or varied domains, which makes this their website. Be particularly wary of check hard. If in doubt, check the .exe, .scr, .zip files and Office files with domain name with a Google search to macros enabled (docm, xlsm, pptm). help your decision making. If it is not a While these are specific file types listed domain, there’s a good chance and quite common, no file type can it’s phishing. be guaranteed as safe and any file can be malicious. If in doubt, contact When checking a domain address, the company directly with a number the correct domain needs to appear sourced from its website. Never use a after the https:// and before the first contact number provided in the email ‘/’. In most cases, anything after the sent to you. first single ‘/’ can be disregarded and is often used by scammers to confuse ■ Poor spelling/grammar you (see phishing image example). In the past, phishing could often be If you notice something is different, you picked up due to poor English and can use this tool to help you confirm grammar. Low level phishing will often your thinking: still contain spelling and grammar mistakes, but targeted phishing can be https://isitphishing.org very well written. 9
3 Email security: Phishing More telltales of phishing If you receive an email that you are unsure about, these considerations will also help you decide if it’s phishing: SENDER: CONSEQUENCE: 1. Were you expecting the ‐ Is there an undesirable impact if communication? you don’t respond within a certain timeframe? For example, the 2. Is the sender known to you consequence may be loss of system (email, text message, phone call)? access or a financial penalty. 3. Is the sender asking for information ACT: that is inconsistent with their role or their need to know the information? ‐ Scams often include a timeframe in Even if you do know the sender, be which you need to urgently act or careful of spoofing! The person behind respond. They may ask you to open an the email may not be who they claim attachment, access a web link, confirm to be. your personal details or request action relating to your bank account. Scams Spoofing is a type of scamming that often include a timeframe in which you uses the trust that you have with a need to act or respond and have a person you know to attack. Email sense of urgency to them to entice you spoofing is the creation of email to act. messages with a forged sender address. The only way to verify a MOTIVE: spoofed email is by directly contacting the sender – but not via the ‘return’ ‐ Is the email playing to your emotions, email. It is not possible to authenticate such as panic or fear of consequences an email by looking at the sender rather than logic? address. Cybercriminals in recent times have been known to spoof RMIT email addresses, so please be careful. If you are being asked to do something unusual, look for other telltale signs. If you are in doubt, please make a phone call to confirm the request. 10
3 Email security: Data loss prevention Information Protection Classification labels – protect your files and emails with a security label ■ Restricted ■ Protected ■ Trusted ■ Public Office 365 allows users to apply an Information Protection Classification label to files and emails. The sensitivity label protects the data. The use of Information Protection labels is recommended for students. The classifications are: Public, Trusted, Protected or Restricted. The classification you apply will depend on the sensitivity of information contained in the document or email, including any links and attachments. Look for the ‘sensitivity’ labels on your Microsoft Office 365 tool bar. More information (staff only): rmit.edu.au TIPS If you receive a ‘labelling recommendation’ and you are not the author of the document, contact the author prior to accepting and applying the recommendation and before you finalise the document. 11
3 What does Policy Pat say about email protocol? ■ All activity on RMIT systems ■ Microsoft Office 365 is the only must be traceable. Group and email client to be used to access shared mailboxes must not be RMIT email. used anonymously. While it may be a group mailbox sending the STAFF ONLY email, the email must include an individual’s name as the sender ■ As an RMIT employee, you must to sign off the email. This helps classify emails using the Information our RMIT community to verify any Protection labels available on your request before responding. toolbar (Public, Trusted, Protected, Restricted). ■ RMIT email should be used predominantly for University ■ Work emails or any attachment purposes. Minimal personal use must not be sent to a personal is allowed. A personal email email address. address should be the primary email address for personal ■ Before you press send, double communications. check your senders’ list to ensure your email is going to the right ■ You are responsible for any activity person. done under your username, so lock your computer when you step away ■ Be careful using email auto- and do not share your account prompts. Using auto-prompts with anyone. makes it easy to select an incorrect name from your sender list and ■ You must check for and report risks sensitive information being suspicious emails. sent to unauthorised recipients. ■ Before you forward an attachment ■ Group email lists must be kept up or link to anyone, you must verify to date. Using outdated lists may the link and attachment. Do not put confidential data into the wrong assume that either are safe. hands and result in regulatory fines against RMIT. 12
4 Internet use: Safe connections, social media Safe connection Social Media Connect safely Social media Only use secure or trusted connections Social media platforms are frequently such as RMIT WiFi, your home network or accessed by people with malicious intent Eduroam (educational roaming). (primarily identity theft and information gathering for the purpose of larger-scale ■ Public WiFi is generally not secure, cyber-attacks). even if you have a security code to access it. When using social media: ■ Don’t use public WiFi to access any personal information or accounts as ■ Never use your RMIT password or email. this may allow other people to gain ■ Be conscious of what you share online. access to it. Personal information, organisational ■ Treat the WiFi at cafes, airports, structures and information visible hotels, shopping centres or similar on notice boards can be used to as unsafe; only use it for activities compromise security. Scammers use such as general browsing of sports, information from innocent posts to build weather and news. their scams. ■ Avoid posts disclosing your location or If you need to provide sensitive information your role within the University. online, check the URL starts with ‘https’ or has a padlock symbol in the address bar, We all have a role in protecting the reputation which signifies you have a secure connection. of the University, both on and offline. Social media can favourably influence a reputation ■ Unlawful and unethical online and can equally be used to inflict significant behaviour or practices are not personal or organisational harm. permitted on the RMIT network. ■ You must take care not to allow malicious software or security vulnerabilities into RMIT systems. ■ Do not use RMIT resources excessively for personal use or in a way that would detract from another user’s experience. What does Policy Pat say about safe internet use? 13
5 Securing, sharing and storing data: OneDrive, SharePoint, Teams, CloudStor SharePoint USB SharePoint is the University’s tool for file SSD storage and sharing. Before using any SharePoint sites, it is important you are aware of the security implications of storing, accessing and sharing files. Google Drive, USBs and flash drives should not be used to store RMIT data. USBs SharePoint help, tips and FAQs for site and flash drives are not a safe storage owners and users. option as they are easily lost. A USB stick can carry a malware infection, which can SharePoint RMIT Learning portal infect a computer when connected. Resist the temptation of a freebie if you see one Refer to our SharePoint owner and lying around or are offered one from an user tips to ensure your information untrustworthy source, i.e someone handing remains protected and secure in them out on the street. SharePoint Store and share data safely Cloudstor RMIT provides staff and students with Aarnet’s Cloudstor is also an endorsed tools that enable safe storage, sharing and secure storage repository for research data. access to electronic files through OneDrive, SharePoint and myDesktop. These tools should be used in line with our Information Security Policy. Protect and respect sensitive data It’s important to respect data confidentiality both in a workplace and in your personal world. When your data is no longer required, it must be respectfully disposed of or stored as per legal requirements. 14
5 Securing, sharing and storing data: OneDrive, SharePoint, Teams, CloudStor Site owners ■ Before you create a new site, define the purpose of the site and define who should have access. ■ Know and understand your security and access responsibilities. You must regularly review and update who has access to ensure it is only given to people who need it. SharePoint users ■ Understand the site’s external sharing ■ Before you add or access files on (outside of RMIT) permissions. any site, discuss with the owners the purpose of the site and understand ■ Have two to three current site owners. who will have access to files stored in This will make access requests and that location. reviews easier to manage. ■ Make sure appropriate Information Classification labels (Public, Trusted, Protected or Restricted) are applied to all files before they are uploaded. ■ Remember, different areas of a SharePoint site may be accessed by different groups so it’s important to always know where you are uploading a file/folder. ■ NEVER upload sensitive information to a ‘public’ SharePoint site. Documents uploaded to a public SharePoint site are accessible to all RMIT staff and students 15
5 Securing, sharing and storing data: OneDrive, SharePoint, Teams, CloudStor Microsoft Teams When storing files in Teams, remember that they are stored in an underlying SharePoint site. Check with the Teams group owners to ensure the site is secure. Tips to ensure your information remains What does Policy Pat say protected and secure: about securing, sharing ■ When sharing your screen via Teams, and storing data? be mindful of the information visible, including Posts or Chat or Files in your Teams window. ■ Information should only be ■ When inviting a guest (someone made available to those that external to RMIT) to join a Team, be need it for University work. aware that you are giving them access When sharing any information, to all files, folders and posts that other consider the purpose of why team members have access to. you are sharing it and share the minimum information required ■ When inviting a colleague or guest for the task. If it is anything (someone external to RMIT) to present sensitive such as personal at one instance of a recurring meeting information, research, results using Teams, be aware that the or assignments, make sure that person can see all new chat activity you are authorised to share it. from then on. ■ Click here for more information ■ If you provide access to Teams files or on Acceptable Use standards) folders for people outside the team, ensure you let your team know who ■ RMIT data should only be has access. stored on RMIT endorsed sites or locations. Using non-RMIT endorsed storage options is a security risk and a violation of RMIT Records Policy. 16
6 Remote working/ learning/study Connect safely When working remotely, generally, personal devices are less secure than those provided to you by the University. TIPS ■ Avoid using personal computers ■ Keep your operating systems and NEVER use personal email and apps up to date. If you are accounts to store and send an RMIT staff member, regularly RMIT data. restart your RMIT-provided devices so the latest software with ■ Always save work files to the all available security controls can RMIT-approved tools, such as be deployed to you. M365, TRIM or other approved business systems. ■ If you use a shared computer, remember to log off at the end ■ Use RMIT-approved applications of your session so the next user and network tools (e.g. Microsoft can’t access your account. Teams instead of Zoom). ■ Lock your screen so others don’t ■ Secure your personal devices have unauthorised visibility of your so any RMIT information is not information. accessible to others. ■ Keep a clear workstation ■ Apply the right Information whenever you step away from it. Protection label before you store or send any file. ■ Don’t leave information in areas where it may be seen by ■ Use a secure WiFi network or unauthorised people. ethernet connection. ■ Don’t allow confidential ■ Enable WPA2 security on your discussions to be overheard. home WiFi router. ■ Shred printed documents that you ■ Change the default password on no longer require. your router. 17
7 Personal devices Devices are at risk of being hacked by cyber attackers. ■ Keep the operating system ■ Set and forget automatic updates as and applications up to date. a default feature. Most updates include security patches. ■ Disable WiFi and Bluetooth auto- connect when not required so no one ■ Keep a current antivirus can use them to access the data on software version running and your device without your knowledge. follow guidelines published on the ITS website for device ■ To prevent the transfer of malware, security. charge your devices directly via a power point rather than USB or ■ Keep a screen lock computer ports. Use your own power enabled that uses a unique adapter and charging cord rather than authentication method, PIN, sharing these accessories. pattern or fingerprint. ■ When using a non-ITS managed device (e.g. mobile or laptop) to access RMIT What does Policy Pat say? systems or data, enable a ‘find my device’ (Android) or ‘find my phone’ (Apple) capability and ensure it is useable if the device is lost or stolen. ■ Change your RMIT account password immediately if your device is lost or stolen. ■ Do not store RMIT data locally on the device memory. 18
8 Mobile applications Use the Apple App Store or Google Play for all your applications. To avoid malware infecting your device, do not install apps, certificates or any other executable files from links in emails, social media, text messages or pop-up ads. Review your privacy settings after every mobile application upgrade. An upgrade may put your settings back to default and compromise your security. What does Policy Pat say? ■ Don’t install any software or use Software-as- a-service without ITS approval (via ITS service desk). ■ Unlicensed software must not be installed on any RMIT devices. Copies of licensed software must not be installed on your RMIT devices. ■ Security features or storage on your PC must not be removed or modified for any reason e.g. troubleshooting. 19
9 International travel Stay protected when travelling During your journey Travelling overseas makes you more ■ Defer social media posts until you vulnerable to cybercrime compared are home. with staying at home; about 20 percent of travellers experience some form of ■ Take all your electronic devices, cybercrime. Whether you are travelling including any security tokens, onboard for work or pleasure, add a few extra with you when flying. Store your precautions into your travel plans to security token separately from your reduce your risk. laptop, such as in your coat pocket or personal carry-on luggage. Before you leave On the ground ■ Update your device with the latest software. Plan to use your ■ Remember, it’s safest to connect smartphone’s mobile hotspot as a using your data plan and international secure internet connection rather than roaming. unsecure public WiFi. ■ Switch off Bluetooth and WiFi auto ■ If you are travelling to a destination connect. Turn them on only when you where there may be data interception need them. by the country’s government, it is recommended you don’t travel ■ Avoid connecting your phone using with devices. Bluetooth connectivity in rental cars. Your device may be vulnerable to ■ Refer to the International travel pages hackers and personal information for more information. such as contact lists may be retained even after the connection has been terminated. TIPS Click here for more travel safety advice. 20
10 Incident reporting and help The RMIT Service and Support Centre is just a phone call away. When it comes to cyber safety, it’s best to act early. ■ To book a cyber awareness team briefing, email the RMIT All staff and students should report any Information Security Office suspicious online requests or incidents related to their RMIT login and email account ■ Become a Cyber Ambassador that may lead to a data breach as soon as possible. ■ Join us on Yammer: RMIT Forward any suspicious emails (phishing) Cybersecurity Awareness immediately to: reportphishing@rmit.edu.au ■ For more information on cybersecurity For help or to report a data or security incident, contact the RMIT ITS Service and Support Centre: rmit.edu.au/its/ithelp RMIT ITS Australia +61 3 9925 8888 RMIT ITS Vietnam Hotline +84 28 3776 1313 Full details on the RMIT Information Technology and Security Policy can be found here. Full details on the RMIT Acceptable Use Standard – Information Technology can be found here. 21
Remember, data never sleeps and the internet doesn’t forget. Special thanks to: Nguyen Trung Hieu - Multimedia Designer, RMIT Vietnam Nguyen Anh Duc - Creative Service Lead, RMIT Vietnam Steven Lam - Intern, RMIT Melbourne School of Engineering for their invaluable contribution to this booklet. 22
You can also read