Information Security Awareness

Last updated on April 26, 2024

Jump to a Security Awareness page:

Safe Computing Link Cyber Threats Link

Security Tip of the Week

Protect your wireless network by creating a unique username and password.

After you set up your wireless network make sure that you change the default username and password. This will better protect you and your network.

May - 2024 - Poster - Cloud Authentication

Is your head in the clouds?

May focuses on Cloud Authentication!

Get on cloud nine - fall in love with cloud authentication!

What is authentication?

Authentication is the process or action of verifying the identity of a user or computer process. This can be accessing a personal device, such as a phone or computer, or personal account, such as online banking, a social media app, a dating app, or gaming app. 

Authentication is also used to access your professional device, accounts, or services. Examples of this would be entering your work username and password to access your work phone or computer or accessing work-related applications or services such as Microsoft Teams or Virtual Private Network (VPN) on your work or personal device.

What is cloud authentication?

Cloud authentication is the process of authorizing users to securely access information stored in the cloud with authentication provided via cloud-based services.

What are examples cloud authentication in everyday life?

Use of cloud authentication in everyday life includes, but is not limited to:

  • Multi-factor authentication (MFA)
    • The use of two or more authentication types to verify your identity to access a device or account.
  • Biometric authentication
    • Authenticating using biological characteristics of an individual, such as voice recognition, an iris scan, or fingerprint recognition.
  • Token authentication
    • Authenticating that allows users to verify their identity to a website or account. Users receive a unique code or token from the website to verify to the site that they are who they claim to be.
  • Single Sign-On (SSO)
    • Authentication that allows users to access numerous applications and services by logging on with one set of credentials.
  • Federated Identity Management (FIM)
    • Authentication that allows single sign-on across multiple organizations or domains.

What are the benefits of cloud authentication?

Benefits of cloud authentication include:

  • Remote accessibility,
  • Simplified user experience, and
  • Robust security.

What are risks associated with cloud authentication and how can I manage them securely?

  • Password and verification code security.
    • Never give passwords out. Service Desk teams should never ask you for password information or MFA verification codes.
  • MFA prompt bombing.
    • If you receive an unsolicited message letting you know that there has been an attempt to access your account, be suspicious of this and reset your account passwords.

Take the Cloud Authentication Quiz!

SANS: Cybersecurity Leadership Summit 2024 

Date: May 16, 2024 

Time: 7-11:40 am Pacific

Location: Virtual 

CPE Credits: 4 

Register: https://www.sans.org/cyber-security-training-events/sans-cybersecurity-leadership-summit-2024/

 

Security Day: Guardians of the Cloud – Innovations in Authentication and Cybersecurity 

Dates: May 28-29, 2024 

Time: 9 am-12:30 pm Pacific 

Location: Virtual  

CPE Credits: 7 

Register: www.gov.bc.ca/securityday 

 

SANS: Cybersecurity Leadership Summit 2024 

Date: May 31, 2024 

Time: 6 am-2 pm Pacific 

Location: Virtual 

Cost: Free 

CPE Credits: 6 

Top 10 Cyber Security Tips Security Awareness Quizzes
Password Best Practices Information Security Thought Papers
Information Security Glossary Internal Phishing Service
Tip Guide: How to Protect Your Home Computer Cyber-Safety For Mobile Workers
Using A Public Computer Protect Your Mobile Devices
Setting up your Wireless Router