Intro to <br><noscript><img src=

Intro to
Cybersecurity Awareness Month

Date: October 3, 2019
Tags: , , , , ,

By Steven Luczynski, Chief Information Security Officer, T-Rex Solutions.

October is National Cybersecurity Awareness Month, #BeCyberSmart. For the past 16 years, DHS and the National Cybersecurity Alliance have teamed up to provide valuable methods that anyone can use to protect their data more effectively.

At T-Rex Solutions, we appreciate this effort as it helps to remind our employees, in the same manner we advise our clients, to pause and consider the importance of fundamental cybersecurity practices and the need to perform basic cyber hygiene.We are proud to be Champions supporting this work!

There are three components to this year’s overarching campaign theme: OWN IT – SECURE IT – PROTECT IT. Throughout October, I will provide my own take on these components and highlight how T-Rex employees, our most important cybersecurity assets, implement these concepts at work to ensure they are successfully protecting our corporate and customer data.

We also encourage our employees to utilize these same cyber hygiene habits at home to protect personal data for themselves and their families.

OWN IT

Our training often addresses the threat of phishing emails which could impact the security of our networks. The best phishing emails are comprised of valid information that is easily found online. Our digital footprint across social media allows a malicious actor to include key facts that make a suspicious email more convincing which increases the likelihood of a link or attachment getting clicked.

To counter this threat, we are mindful of the corporate details we post online. We also emphasize this same mindfulness to our employees, so they are aware of this type of threat before posting corporate details on their own social media, such as the name of a customer when celebrating a new contract award.

This also holds true for our employees as they consider the personal details they post online, such as an upcoming vacation that reveals when their home may be unoccupied. Protecting simple details such as these are easy ways to mitigate threats to our company and our employees.

For more information on these topics, check out:

https://staysafeonline.org/ncsam/about-ncsam/

https://www.dhs.gov/sites/default/files/publications/Social%20Media%20Guide_3.pdf

https://www.irs.gov/identity-theft-fraud-scams

https://www.trexsolutionsllc.com/what-we-do/cybersecurity/

Other articles in our Cybersecurity Awareness Month Series:
Cybersecurity Awareness Month Series: Secure IT

Cybersecurity Awareness Month: Secure IT with Passwords

Cybersecurity Awareness Month Series: Protect IT

Cybersecurity Awareness Series Finale


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]