Thursday, September 18, 2014
  • Monday, April 01, 2013

    PII -- It's Your Identity!
    When is the last time a customer service agent asked for the last four of your social security number and your date of birth? Supposedly, when you answer questions like these, you are confirming your identity because the information you provide is only known by you and very few others.
  • Thursday, March 07, 2013

    Ransomware...Can You Afford It?
    Scammers are using a form of malware called Ransomware to terrorize computer users. This type of malware prevents a user from using his or her computer or accessing any data until a payment (the ransom) is
  • Wednesday, February 20, 2013

    “For Official Use Only”
    If you’ve worked around the Department of Defense (DoD) for any length of time, you have read or heard this phrase many times. Commonly referred to as FOUO, the term obviously means that the information is For Official Use Only, and should be handled accordingly.
  • Monday, January 28, 2013

    New Year Resolution: Improve Workplace Security
    The beginning of each year is an excellent opportunity to look at ourselves and resolve to improve. Resolutions can also help improve more than your personal life. They can improve your workplace, too!
    This year, consider making resolutions to improve your workplace security.
    Resolution #1: Maintain Control of Your CAC. Many of us walk away from our Government computer without removing our Common Access Card (CAC) before departing the area. We assume no one in our office would deliberately harm our system, but we are
  • Friday, December 21, 2012

    Say Goodbye to 2012

    It is time to say goodbye to 2012 and to prepare for another new year. There is much to be grateful for during this holiday season as we are spending quality time with our family and
  • Sunday, December 02, 2012

    The 12 Days of Cybermas,Yet Another Variation on a Holiday Theme


    On the first day of Cybermas my network was at risk
    from a Private with a blank disc

    On the second day of Cybermas my network was at risk
    from two thousand spams
    and a private with a flash drive
  • Tuesday, November 06, 2012

    Smoke Signals Key Management
    Yes, it’s all about the Network, and this includes ensuring information that travels the Network is secure. This means not just accessing the correct data or getting your message, email, video, or other data from one point to another, but also ensuring the information that was sent is the information that was received.
    Communications Security (COMSEC) is an essential component to enabling a secure Network and managing Army information.
  • Monday, October 01, 2012

    Securing the Home Network
    Before going to bed, most people ensure they have locked the door and checked the windows to make sure their home is secure; and if they have an alarm system they usually arm it as well. Why do we take such precautions to safeguard our home? We implement these security measures to protect our valuables from theft and harm.
  • Saturday, September 01, 2012

    Password Protected
    We often find ourselves receiving notices that our password is about to expire and needs to be changed. Many times we curse getting that message because we have so many other things to worry about that require our immediate attention, and we know the time and frustration that results from having to think up and remember a new password. Additionally, most of us have passwords to our many personal accounts from email, to banking, to social media accounts that we must remember.
  • Wednesday, August 01, 2012

    Access Policy

    During our formative years we are taught by our parents, teachers and relatives how to be nice and how we should treat others. We are taught what we should and should not do, as well as what we should and should not say. Most young men are taught to hold the door for ladies, and offer assistance to people with their hands full. Even today some grocery stores offer to carry your bags to your car free of charge. Yes, we are always trying to be helpful.
  • Sunday, July 01, 2012

    Vacation Awareness
    The sun is rising earlier, the weather has gotten warmer, and the kids are out of school. It must be summertime and time to hit the road and take some well deserved time off. This is the time many of us are leaving work behind to spend time with loved ones, and to visit the many historic sites both domestically and abroad. Most of us have a to-do list we follow before we go on vacation, we remember to stop the paper and mail delivery, turn off the lights, and grab the sun screen before we head out.
  • Friday, June 01, 2012

    Think OPSEC
    Once upon a time the US was known as the “Melting Pot of the World” because people from every corner of the globe would flock here to start a new life. You can see this every day as you walk down the street, ride public transportation or even shop at your local mall. Many times you will overhear people having a conversation in their native tongue and find it fascinating. “What exciting tales are they sharing” and “what language is that” are just some of the possible thoughts that may cross through your mind. As you overhear their conversation and wonder what information these two friends are sharing in their native language you should think how many times someone has overheard you speaking.
  • Monday, May 07, 2012

    Removable Media Destruction
    With the ease of use and technological advances, the quantity of removable media in the government and military is increasing. Removable media refers to storage media that is designed to be removed from the computer without powering the computer off. Removable media comes in many forms, but typically includes CD/DVD, secure digital (SD) cards, tape, flash drives and multimedia cards. Removable media often contains sensitive bits of information, which should not be just thrown away. Regulations regarding paper documents also include the different types of removable media, and your organization should incorporate removable media into its records management program and retention schedule.
  • Monday, April 02, 2012

    A Fool and His Data
    Whether it’s accidentally lost, or stolen as part of the rising trend of smartphone robberies, setting a passcode on your device can provide a first line of defense for protecting your personal information. Remember, it’s up to you to prevent data loss, so make sure you always use a sensible passcode on your mobile device.
  • Monday, March 19, 2012

    On Phishing!
    The IRS is warning taxpayers to beware of unsolicited emails that appear to be from either the IRS or an organization closely linked to the IRS, such as the Electronic Federal Tax Payment System (EFTPS). Suspicious emails attempting to get your personal information should be ignored. Bear in mind that the IRS would never request personal or financial info via email, nor would it request information from you by text message or social media sites.
  • Monday, January 02, 2012

    The Last Cyber Warrior
    Digital technology now touches almost every living person and as time moves on its reach will only continue to grow. With technology reaching us all and being incorporated into more parts of our daily lives, you can no longer rely on someone else to protect you. Whether it is defending your data at work, or defending your personal data at home, being an effective cyber defender is a continuous responsibility.
  • Thursday, December 01, 2011

    Tis the Season to Watch for Scams
    This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.
  • Tuesday, November 01, 2011

    An Alternative Approach to Implementing New Technology
    How the “bad guy’s” business day goes and how they “procure” materials and services. By skirting proper procedures in favor of timely completion of a task provides just the “backdoor” needed to make a “bad guy’s” day. The rules are there for a reason. Technology can build very strong doors, but it is the individual that turns the key.
  • Monday, October 03, 2011

    Watch Out for Bogies When You Hit the Links
    Usually it is still relatively easy to spot phishing scams from foreign countries because of the bad grammar and spelling used in them. But online scammers have continued to improve and may have even taken a few English classes. The results are new phishing attempts with potentially dangerous links that are harder to identify and dismiss at first glance. That puts the unwary recipient – like a tired soldier or a family member who is not cyber savvy – at risk.
  • Thursday, September 01, 2011

    Are You Listening Out There?
    In the military there are a number of national security reasons for not giving up critical mission data and Personally Identifying Information (PII). When data like that is lost, operations and lives are at risk. Staying safe online should be an easy gig. Using a little common sense and self discipline just means that all you have to worry about is traditional soldier stuff. Guess what. It doesn’t get better. Whether you are a short-timer or a lifer, eventually you will leave the warm protective embrace of the Army. All your digital devices will be yours and your responsibility. All you can do is be vigilant. When you leave this wonderful Army, you’re on your own in cyber space.
  • Monday, August 01, 2011

    It’s all about the Net-Work!
    Keep up to date with information on protecting the network. Network with peers, subject matter experts and maybe even your own friends and family; talk about best practices, dealing with threats and known vulnerabilities and what may be coming in the future. Conferences like LandWarNet are great places to do this, but not everyone has the opportunity to attend. Actively seeking the experience and wisdom of others and sharing the same will help keep this critical task on the front burner.
  • Friday, July 01, 2011

    The Dangers of Getting Picked Up in a Parking Lot
    One might argue that it is just as likely that the DHS may have dropped thousands of these test devices, but with only a small fraction actually being picked up. But as we know, it only takes the introduction of one piece of malware onto a network to cause significant damage. So then, do the raw numbers matter? Perhaps not so much. This isn’t picking on certain groups like government employees or patrons of fast food establishments. All this does is highlight why there is a large group of people from all walks of life who are victims of cyber crime.
  • Wednesday, June 01, 2011

    What’s in a Name?
    A conversation is held in the Company Briefing room on the various names for the GIG, GNEC, or GRID and the result is that no matter the name used it must never be called Comprised.
  • Sunday, May 01, 2011

    Don’t Wear the Hat!
    Cyber criminals are constantly seeking out areas of weakness to be exploited. This article takes an ironic approach to highlighting areas of security that must be maintained and should never be left undefended. This approach is taken by highlighting mock guidance that it claims has been released by the intelligence community.
  • Friday, April 01, 2011

    Classic Cyber Caltrops
    What’s a Caltrop? The cyber version of the caltrop is the classic phishing scam. They are relatively easy to spot and very easy to avoid. They pale in comparison to the sophisticated phishing schemes that recreate entire web sites and use personalized spear phishing techniques. Those can occasionally fool even seasoned web users. But these cyber caltrops still catch the unwary, the unwise and the uneducated. To most of us that have any level of cyber security training, or even pay attention to the news, these scams seem painfully obvious.
  • Tuesday, March 01, 2011

    A Dangerous Game of Tag
    Images taken with mobile devices will often have their geo-location information automatically embedded in the picture data. This option of geo-tagging images can inform others of your exact location at a particular time, and could have unintended consequences if the images are shared online.
  • Tuesday, February 01, 2011

    Preparing for Predatory Peripherals
    New methods have been developed to compromise computer peripherals. New threats like this reinforce the need to ensure the physical as well as the virtual security of your computer equipment.
  • Monday, January 03, 2011

    2011 New Year’s Resolutions (Theirs, Not Ours)
    Ten goals for the New Year from the “bad guy’s” perspective and the listed ways they currently gain unauthorized access to our Army network and personnel’s data which will be exploited for the enemy’s profit and gain.
  • Wednesday, December 01, 2010

    Did you Read Your STIG Today?
    The reasons to have Security Technical Implementation Guides (STIGs). There are two aspects to cyber security, the technical – firewalls, anti-virus, software, ad blockers – and the human. The human aspect carries the most risk, because it often relies on a number of people to follow safe cyber procedures and exercise some common sense consistently and uniformly. More information on STIGs, plus a mailing list signup is available at the Information Assurance Support Environment (IASE) Home Page, sponsored by The Defense Information Systems Agency (DISA): http://iase.disa.mil/stigs/index.html.
  • Wednesday, December 01, 2010

    The 12 Days of Cybermas
    The article shares the lyrics to the 12 Days of Cybermas which has an Information Assurance theme and the related video OCP cartoon was placed online.
  • Monday, November 01, 2010

    Patching Things Up at Home
    There is hardly a piece of software in use today that does not have some level of interactivity that allows communications with the Internet and other software packages. While this feature allows for significantly expanded capability and productivity, it also carries the potential for software and systems to be compromised by malware and cyber attacks. Like your house, there are many ways to get in to the inner workings of software -- front doors, back doors, basement windows. Even when you have taken every precaution in securing you house and software from the obvious intruders, there are still successful infiltrations all the time. If not how do you explain the crickets, ants and occasional fly. When they get in, the results range from annoying chirping (adware) to infestations of your food storage (data loss and compromise). There are ways into everything and the bad guys – and bugs – make a real effort to find and exploit every vulnerability in your defenses.
  • Monday, August 02, 2010

    A Call to Action- Reinforcing the Cyber Defenses from Battlefield to Family Basement
    The creation of the new Army Forces Cyber Command (ARFORCYBER) is a yet another tangible sign that victory on the cyber battlefield will be as critical to the defense of this nation as victories on the traditional battlefield. However, everyone must be vigilant as even our most dedicated efforts in keeping classified information secure can be undone by a single mishap within our network, and cyber criminals only need to find one open door to breach our lines to do significant damage.
  • Thursday, July 01, 2010

    Encryption Means Never Having to Say -Y&jjh%ff55keJH
    Encryption keeps data and communications safe even if it physically or electronically falls into the wrong hands. However, not using encryption only exposes identities, missions and lives to unnecessary risk. Using FIPS 140-2 compliant encryption is vital for keeping information secure and out of the hands of our enemies.
  • Tuesday, June 01, 2010

    Reporting Data Loss: Tough Choices, One Answer
    Reporting a network security breach is a regulation that must be followed Since it is a regulation not completing it by covering it up or for another should not be an option. Loss of data or a compromised mission put soldiers at risk of an ambush or identities being stolen and good names being turned to mud. Report it or don’t? Only one decision protects us all.
  • Monday, May 03, 2010

    CAR Talk
    Contact a CAR or a Certification Authority Representative if IA practices have Not been followed and the circuit connecting your devices has been turned off due to the lack of updates on your devices posing a serious network risk (a risk to one is a risk to all on the network). A CAR is contacted to help update and secure your equipment to have certification approved and get your connection to the network re-established.
  • Tuesday, February 09, 2010

    USB’s
    Even with all the rules, regulations and technology that will go into the return of flash media on military networks, effective information assurance will still come down to responsibility, knowledge and attention. Those attributes will spell the difference between total security and potential disaster.
  • Monday, February 01, 2010

    Coming to Grips with the Growing Cyber Threat
    Quite often people do not consistently practice good information assurance practices until they have become a victim of the data loss. It doesn’t have to be this way, just like every piece fits to make a full puzzle, everyone can do their part to keep their small corner of the network safe and secure and encourage others on their team, unit or agency to do the same. It only takes one to not protect access to data and networks & can let in an attack that makes all other precautions useless. Don’t be that person and be the strength that protects your corner of the net.
  • Tuesday, December 01, 2009

    The Gift of IA Awareness Keeps on Giving.
    Online and traditional media are adding internet dangers to their list of holiday warning stories. Unfortunately, many of the most likely victims never see those articles, videos and TV stories. They are too busy buying, donating and making new friends online. Internet access is the BB gun gift of generations ago. If you are not taught how to use it correctly, then “you could shoot your eye out.”
  • Monday, November 09, 2009

    Clearing up the Whole CIA Question
    Confidentiality, Integrity and Availability make up the triad of Information Assurance, backed up by Authentication and Non-Repudiation. No matter how it’s explained, it’s something we all need to understand.
  • Friday, October 02, 2009

    The Critical Moment of Awareness
    October is Cyber Awareness Month, it would be great for the Network and those who address the various breaches of security for it to be every month but there is no budget for that. only five of these moments a day. But consider all that is needed is to have brief moments of cyber awareness a day (probably 5 a day total 10 seconds long). That is only 50 seconds a day devoted to having to be smart about IA. Such a small commitment of time would leave everyone plenty of time to be aware of other important things. So pay attention in October to the Cyber Awareness messages and then be very alert to those five daily IA decision point moments, less than a minute a day. It’s not too much to ask for protecting missions and lives through good information assurance practices.
  • Saturday, September 19, 2009

    The “I” in Information Assurance
    There may be no “I” in Team, but there is one in IA (information assurance). When protecting information, it’s the individual that needs to step up. One of the most significant threats to data security is not deliberate actions but moments of inconsistency and inattention by an individual. The only person that can do what needs to be done, to protect information, which in turn protects lives, looks back at us from the mirror.
  • Saturday, May 02, 2009

    Best Practices Make Perfection(The Lost, the Misguided and the Sinatras.)
    Discusses why Best Business Practices are used and that they are more than a list of suggestions and what three types of people do not follow them and the consequences of those actions. The Army’s Office of Information Assurance and Compliance has an extensive list of IA BBPs that are available on the IA website (https://informationassurance.army.mil). BBPs are the best way of performing a task using current knowledge, policy, and technology but if a new method is found to work it can be submitted and possibly added to the current BBP list.
  • Wednesday, April 01, 2009

    An Argument for Asset Covering
    Lots of Administrative work goes into helping the military run smoothly; this includes keeping track of all the Army assets. “Securing the Enterprise” is just a fancy name for covering our assets. In reality, it’s securing mission success and supporting the safety of the warfighter.
  • Monday, March 02, 2009

    National Cyber Defense Requires Close Cooperation
    Cooperation and collaboration helps and protects each group. The internal hoarding of knowledge and information for the sake of “territory” runs the risk of weakening the united defense that is necessary for success. DOD has tapped commands like U.S. Strategic Command (STRATCOM) and Joint Forces Command (JFCOM) to sponsor cooperative efforts among the Services and Agencies. The key to success is cooperation from the top to the bottom and all areas in between.
  • Monday, February 02, 2009

    Keep Your System Vehicles Inspected
    Making sure your computer system satisfactorily goes through Information Assurance Certification and Accreditation (C&A) is the same as getting your car inspected. It ensures that your system/car meets the official minimum security and information assurance (IA) maintenance standards to protect your system and the network.
  • Thursday, January 01, 2009

    Information Assurance New Year’s Resolution List
    Ten items on the Information Assurance New Year’s Resolution list which detail how to be more information assurance security conscious but stated in a factual but humorous manner.
  • Wednesday, December 03, 2008

    Cyberspace Security Can be Gone in a Flash
    It is time for all people with access to government computers to upgrade to Personal Responsibility 2.0. The earlier version is no longer supported and will not run on any machines connected to the Global Information Grid (GIG). The training and information is out there and there is more on the way. We have seen that if you play dangerously and someone gets hurt, they take away your toys.
  • Monday, November 03, 2008

    Data Security is the Rule of Thumb.
    Ensure security of mobile media by implementing security routines in the handling, storage and accountability of removable data devices.
  • Wednesday, October 01, 2008

    All Laptops, Report In!
    An Executive order is given to locate and track in a database all equipment on base & in the field (from servers and laptops down to a wrench). This will help with reductions in requisitions of equipment, expose any needs for equipment as well as keep information on that equipment safe and if not present the proper measures will be taken to address the loss of data and equipment.
  • Monday, September 01, 2008

    Not Your Father's Widget
    A List updating the Army soldier’s operational vocabulary. Two columns are presented as the “Classic” terms/slang used in the past and a “Current” terms/slang that are used now; the list is an unofficial primer in the new language of today’s Army.
  • Friday, August 01, 2008

    Remember To Look Next To You When Eliminating IA Threats
    Identifying internal threats to data security is as critical as stopping external threats. Establish and enforce security procedures that can stop these internal threats.
  • Tuesday, July 01, 2008

    Don’t be Asleep When Protecting Data at Rest
    Data At Rest (DAR) is critical for keeping information secure and inaccessible when not in use. It is up to all of us to ensure that a DAR solution is implemented and that we know how to use it. However, even though a DAR solution is implemented, it is important to still protect the information media just the same as if it wasn’t.
  • Monday, June 02, 2008

    Smarts Make Thingamabobs More Effective When Protecting Stuff
    A quick story about why you must apply “smarts” when using “thingamabobs” and “doohickies” to protect your “stuff.” Information Assurance information written in factual but humorous “laymen’s terms.” Also a funny story is mentioned about keeping the network secure by putting the firewall in a safe (true story).
  • Thursday, May 01, 2008

    Timing is Everything
    Implementing the Information Assurance Vulnerability Alerts (IAVAs) in a timely fashion is as much of a necessity as locking your door at night or not losing your CAC. The longer the “holes” in security are not filled, the easier it is for the enemy to “get in” to our systems. It is not a foolproof defense, but it goes a long way to ensuring that the critical data in your system and the system itself is safer and more secure.
  • Tuesday, April 01, 2008

    Mind Your Ps & Qs
    Defines the “alphabet soup” of acronyms that are used in IA, as in other areas of the military, and the importance of understanding what they mean and how to get more training/information to do the important job properly to protect yourself, your unit and the network.
  • Monday, March 03, 2008

    Training is Just Common Sense
    Many items of training are actually common sense (protect what is valuable, don’t tell secrets, and don’t lose this item). Lessons will be learned through training or through experience (training is less painful). Examples of common sense are provided in the article. For more training and guidance go to IA training and certification at https://atc.us.army.mil and register any training already completed so we can all use common sense and keep the network and each other safe.
  • Friday, February 01, 2008

    Don’t Let Lack of Labels Leave You Liabl
    Marking and controlling portable media is as important as any other security measure. Even if there are additional safeguards such as encryption and password protection, labeling media correctly will prevent confusion and potential risk to classified data. Take those extra few seconds to mark that thumb drive or CD and make sure that the designation is clear and correct.
  • Monday, December 03, 2007

    User Awareness Can Prevent Icy Surroundings
    By having current information Awareness you can protect yourself from “cyber” surprises. Taking your annual User Awareness Training mandated in AR 25-2 is worth it just to learn about recognizing and preventing current cyber threats. It will also help you not be an example of what not to do at the next year’s training session. Failing to do so could result in cold shoulders from your peers, hot words from your superiors and very frigid surroundings at your next assignment.
  • Thursday, November 01, 2007

    When Doing the “Right Thing” Can Be Wrong
    Doing the wrong thing for the right reasons is still wrong and can have drastic affects on the network, personnel security and could sacrifice the mission or worse put soldiers at risk if a mission is compromised. In the hurry to get the job done even bigger issues could be created so breathe and take a few extra seconds to pick the best way to solve an issue- don’t worry technology will catch up.
  • Monday, October 01, 2007

    Why Have A Lock If You Leave the Door Open?
    Security measures do no good if they are not used by everyone. Some people believe that the passwords and other measures are too much trouble and can actually spend more time going around them than the time taken to actually plug in the password. If a solider finds a way around those security measures other less scrupulous people can use that as an entryway to the network and then typing in a password a few times a day will be the least of the issues known.
  • Monday, September 03, 2007

    Peer to Peer (P2P) File Sharing
    Peer to Peer (P2P) software such as Kazaa, Lime Wire, Morpheus and BearShare can be a treasure trove for information seekers. Playing games, uploading songs, or downloading from share sites gives an opening for others to use and bypass all the security protocols so that all that time spent on games, songs and downloading is now spent on protecting against the enemy who “somehow” got through our defenses. The greatest data security weakness and its greatest strength is the individual user.
  • Wednesday, August 01, 2007

    Like Poker- Keep Your Cards Close to Your Chest
    Protect your CAC card just like you would your bank/atm card or credit card. Although the CAC relieves us of the requirement to remember lots of passwords, just like your new atm card, you shouldn’t leave your pin in plain sight or your CAC in your computer where it provides access to our Army systems. It’s in your computer while in use or on your person safe and sound.
  • Thursday, July 19, 2007

    The Human Factor
    There is one critical factor that can be the fatal flaw in any information assurance strategy: the human factor. No method is foolproof for one simple reason. There’s a human at both ends of the communications link. It is up to everyone to not be that weak link and to guard against taking “short cuts” and use the methods of communication the way they were intended so all can be safe.
  • Monday, April 02, 2007

    Making Sure Resting Data is All Tucked In
    As laptops and data storage devices become smaller, they become easier to lose, through either neglect or theft; and if critical information is stolen, it could be held for ransom or used to compromise Army operations resulting in a failed mission or even loss of life. This is why it is important to implement a Data At Rest (DAR) solution and ensure that everyone receives DAR training as necessary.
  • Thursday, March 01, 2007

    A Assurance Certification & Training: Knowledge Means Security
    Being armed with the latest knowledge on information assurance and cyber security enables you to protect Army operations and your fellow warfighters. Everyone responsible for any aspect of an Army network should be up-to-date with the training and certification.
  • Thursday, February 01, 2007

    Beware of What You Post
    The Army’s Web Risk Assessment Cell (AWRAC) are a group of dedicated government personnel who troll the internet such as website and online postings to work with owners who unknowingly post personnel information that could be used against them and others (such as birthdates, addresses and where they work). Collected into one picture these snippets of information can tell a large story about a person and their family and work life. Thinking twice before positing information is all that it takes to keep us all a little more secure.
  • Monday, January 01, 2007

    Who Are the Real Cyber Bad Guys?
    The threats to your computer, network, and data may be closer than you think. Terrorists, hackers, and even the guy in the coffee shop down the street may be attempting to infiltrate the computers and network used so we must be recognize more people and countries are using technology now than ever before; so since it is not going away we must protect it from all invaders at home and abroad.
  • Friday, December 01, 2006

    Common Access Card (CAC) is a Cyber Security Ace in the Hole
    Introduces using your CAC instead of numerous passwords to be more efficient and keep equipment and the network secure. Rules for using your CAC card are also mentioned as well as how the CAC card works. The CAC removes the need for multiple passwords but must be guarded and kept safe, just like the network.
  • Monday, October 02, 2006

    Guarding Your Identity Protects More Than Just You!
    By being protecting your identity information, no matter if you are in a government facility, online, or at the bank, prevents your identity from being misused and having others gain access that could be used in turn to harm others (as well as your credit score, clearance, finances, & reputation).
  • Friday, September 01, 2006

    Guarding Information Is Everyone’s Responsibility
    Operational Security (OPSEC) and Information Assurance (IA) are not just Army programs. They are a mindset that requires the constant attention of every Army officer, enlisted soldier, civilian employee, contractors - and their families. It’s easier to cut corners and bypass policies but that leads to an opening that a “bad guy” can use to their advantage and they only need one opening so the justification of “just this once” doesn’t fly and reinforces that the only true protection is human vigilance and the only person that can ensure that happens is you!
  • Tuesday, August 01, 2006

    Get a Grip --- On Computer Assets!
    Maintaining the physical security of mobile computing equipment is essential for protecting these devices and the security sensitive information they contain. Closely watch mobile equipment in your possession. Securely store the equipment when it is not.
  • Saturday, July 01, 2006

    Secure Communications Doesn’t Start with Phones from Home
    Military communications must be kept secure as the enemy can pick up valuable intel from even the most casual of conversations. It takes very little effort to listen in and intercept messages sent through unverified means. This is why using non-approved communication devices, and not following the established IA procedures, can put everyone at risk.
  • Thursday, June 01, 2006

    Phishing Awareness Keeps You Off the Hook
    Phishers try a wide variety of bait and lures to get their victims to bite. They prey on greed, fear, and especially for military targets, obedience to authority. The Nigerian email proves that greed will always catch a few gullible victims who are looking for easy cash. But as the cyber community has become more aware of potential dangers, phishing techniques have become more sophisticated.
  • Monday, April 03, 2006

    Making Information Assurance (IA) Routine Gives Soldiers the Edge.
    All military personnel need to make information and cyber security part of the routine, not a special effort. It needs to be as automatic as cleaning your gear, setting a perimeter and keeping your head down. Once it becomes second nature, just like locking your front door, our focus can be on what Intel we have on the enemy, not what they can gleam from us.
  • Wednesday, March 01, 2006

    The Importance of Manual Labor
    Serving as your unit's Network Administrator entrusts you with a security responsibility as vital as any in the service. Reading and understanding the DoD's information assurance manual is critical to meeting your responsibilities.
  • Wednesday, February 01, 2006

    Mind Games at the Cyber Perimeter
    The technique used in this month’s On Cyber Patrol cartoon is common and surprisingly effective. When faced with the threat of being blamed for something or facing the anger of a superior many people, both military and civilian will break or bend rules, to avoid blame or perceived punishment. It’s often a quick decision based on an emotional reaction to staying out of trouble. What the person trying to gain access is counting on is that the victim will not take the time to think down the road to the potential damage and loss that could result from allowing a breach of security.
  • Thursday, December 01, 2005

    Government Computer Misuse is Anything but Harmless Fun!
    Downloading a free song or game may seem like fun but could also unknowingly place a program or spyware, adware, trackware and other malicious software onto your government furnished equipment which could send information back to anyone in the world without your knowledge. The next time you create a briefing or access your email you could unknowingly be giving Intel to the enemy and by downloading the game/song it is clear violation of AR25-2. Installation of unauthorized Peer to Peer (P2P) applications is strictly forbidden and network monitoring is being conducted to identify illegal activities associated with users performing such activity. A game or song download should not be worth the risk to your fellow soldiers and the Army network.
  • Monday, October 03, 2005

    Password Security is the Key to System and Force Protection
    Passwords for government systems need to be stronger than your home email account password. Examples are provided for strong & weak passwords. Secure and effective passwords, like house keys, deserve and require the attention & protection of every soldier. Combined with the other security procedures laid out in AR 25-2, they create an effective defense against hackers and our enemies.
  • Thursday, September 01, 2005

    IA OPSEC Vulnerabilities Can Aid Enemy
    Operational Security (OPSEC) via Information Assurance (IA) saves soldiers’ lives, perhaps even your own. Transmitting any information over unsecured computer messaging systems, networks and other pathways creates a vulnerability that is actively being exploited by the enemy in all theatres. Using your home email account or other not approved method makes it easier for Everyone to know the orders given and that makes it hard for everyone and worse, more dangerous for all.
  •  

    Contact Us Accessibility/Section 508 Privacy & Security FOIA