Accreditation Now Technology and Cybersecurity Training Note: This training is an overview of technology security within a human service setting. It is intended to provide a basic understanding of technology security guidelines and practices for all employees and meet the CARF accreditation standards for training for all employees. It is not intended to be a substitute for competency-based training requirements. Appropriate technology security policies, procedures and practices that are in accordance with federal and nationally recognized guidelines on technology security provide the foundation for ensuring a secure work environment. Please read through this brief overview of technology security. After completing this overview, complete the questionnaire that follows. This questionnaire will provide several scenarios that can occur in organizations in the area of technology security and are intended to improve your ability to assist in keeping your organization safe from breaches in technology security. This training requires a perfect score to pass. There are only five questions and you must get each one correct. Technology Security Overview Hacking of companies to compromise corporate data or utilize company computers for malicious activity is on the rise at an alarming pace. Most of the time these attacks you see in the news stem from an employee opening an email or attachment they should not have opened. Although much less frequent, some of the time these attacks happen because someone answered the phone and gave away information they should not have, like what vendors you use or what type of equipment you have. Phone Call Safety Telling someone you have WiFi or the name of your phone provider can give a hacker what they need to get in. For example, new customers of Cable Company One are known to have their WiFi password default to their phone number. Once a hacker knows this, knows the name of your provider and if the default password hasn’t been changed, they have what they need to access the system. Email Safety Email is not inherently secure. Sensitive or confidential information (For example, Patient/Client social security information) should not be sent via email. If it needs to be sent via email, you must use an encrypted email service. Be aware of phishing attempts. Phishing is the process of attempting to acquire sensitive information such as logins, passwords and credit card information by masquerading as a trustworthy entity. Emails claiming to be from popular websites are often used to trick you into entering your information. Do not open attachments without verifying the source. Opening a ZIP, DOC, DOCX, XLS, XLSX, EXE or PDF file can compromise your computer. Be vigilant in confirming you know the sender and need the file for business usage. If needed, call the sender and confirm the email is legitimate. Before clicking a link, confirm it goes where it should. For example: http://www.accreditation.com The above link makes you think it will take you to www.accreditationnow.com If you click it, that’s not what happens. You can either hover your mouse over it to see if it goes where it says it goes or you can simply type the URL in your browser manually. Five ways to spot a fraudulent email 1. The from email does not match: Email address is xxxx@gmail.com yet it has a logo of a popular company. 2. Is the email to you? If not, be skeptical unless you can confirm it is authentic. 3. The links in the email do not actually go to the correct website. You can hold your mouse over a link, and it will show you what URL it is going to. If it does not match the company do not go to it. 4. The email appears to be a reply from someone you did not send an email to. 5. An attachment is on the email from someone who normally would not send you an attachment or from someone you did not ask for a file from. Again, if needed, call the sender and confirm the email is legitimate. Workstation Safety Keep your workstation locked if you leave your work area. If you do not lock your screen, someone can interact with the company network using your workstation. On a Windows computer use Windows Key + L to lock your workstation when you get up. Use a strong password. Use word phrases that are easy to remember. Include Capital letters, numbers and special characters with a minimum length of 11 characters. Keep your password safe. Do not share your password with others. Store any password lists in a secure location such as a locked file cabinet or safe. Do not store any passwords in a readily available location like a sticky note on your monitor or in your desk drawer. Technology and Cybersecurity 1 Questionnaire Please answer the following questions by selecting yes or no following the question. 1. If you are going across the hall to make a copy of a single document, it is acceptable to leave your computer unlocked because you will not be away from your desk for more than five minutes. ❒True ❒False 2. Most of the time companies are hacked because someone gives away private information over the phone to a hacker posing as a potential vendor or client. ❒True ❒False 3. Most email programs are inherently secure and will determine if any attachment or link has or points to a virus or insecure website. ❒True ❒False 4. You should always double-check that a link actually goes to the website it says it goes to because hackers will sometimes make it look like a link is going to one website when, in fact, it is sending you to a hacker website. ❒True ❒False 5. If someone you know sends you an email with an EXE or ZIP extension, it is fine to open it since you know the person who sent you the email. ❒True ❒False Technology and Cybersecurity 1 Answer Key Please answer the following questions by selecting yes or no following the question. 1. If you are going across the hall to make a copy of a single document, it is acceptable to leave your computer unlocked because you will not be away from your desk for more than five minutes. ❒True ❒False (False) Tutorial for a “True” answer: Your answer indicated you believe it is acceptable to leave your workstation unlocked while away for an extremely short time. This is incorrect. Many things could cause you to be sidetracked while away from your workstation. Any time you leave your workstation, it should be locked. 2. Most of the time companies are hacked because someone gives away private information over the phone to a hacker posing as a potential vendor or client. ❒True ❒False (False) Tutorial for a “True” answer. Your answer indicated that you believe the most common way an organization can be hacked is via a hacker calling the organization. The majority of hacks happen when personnel open an email or attachment that they should not open. 3. Most email programs are inherently secure and will determine if any attachment or link has or points to a virus or insecure website. ❒True ❒False (False) Tutorial for a “True” answer. Your answer indicated that you believe most email systems are inherently secure. They are not. Although many email systems do provide some security protection, many do not and you should never count on an email system to be secure. You need to always be extremely careful when receiving emails. 4. You should always double-check that a link goes to the website it says it goes to because hackers will sometimes make it look like a link is going to one website when, in fact, it is sending you to a hacker website. ❒True ❒False (True) Tutorial for a “False” answer. Your answer indicated that you believe there is no need to ensure a link goes to where it says it is going. You should always double-check this. If a link goes to a different site than it claims, it is a dead giveaway that you have received an email from a hacker who is trying to attack your system. 5. If someone you know sends you an email with an EXE or ZIP extension, it is always fine to open it since you know the person who sent you the email. ❒True ❒False (False) Tutorial for a “True” answer. Your answer indicated that you believe it is OK to open an attachment because you know the person who sent it. Hackers will oftentimes pose as someone you know and trust in order to get you to open an attachment that contains malware or a virus. You should always know what is contained in an attachment before opening. If there is any doubt, pick up the phone and call the individual to ensure the email is from them.