Maintenance window scheduled to begin at February 14th 2200 est. until 0400 est. February 15th

(e.g. yourname@email.com)

Forgot Password?

    Defense Visual Information Distribution Service Logo

    Good cybersecurity hygiene protects work, at-home networks.

    Cybersecurity: the Human Factor

    Photo By Michele Donaldson | Graphic shows the areas that humans can control in cybersecurity... read more read more

    WRIGHT-PATTERSON AIR FORCE BASE, NORTH DAKOTA, UNITED STATES

    10.12.2023

    Story by Michele Donaldson 

    Air Force Materiel Command

    The internet is a source of infinite information, but not everyone who creates content is reputable. The web is rampant with individuals and entities who wish to do harm.

    Information leaks, blackmail, ransomware, fraud, and financial ruin are a few of the possible hard realities of cybercrime. However, it’s the human element that is the best defense against digital attacks.

    “There are still things that technological safety nets can’t do,” said Randy Miller, Chief Information Security Officer, Headquarters, Air Force Materiel Command. “AFNET users must practice safe cyber hygiene techniques to keep our network safe.”
    Some of those techniques include using caution when accessing unfamiliar hyperlinks, creating strong passwords, multi-factor authentication, ensuring software is updated, and encrypting email.
    These techniques are very important not only for the Department of Defense but also at home.
    First, individuals need to think carefully before accessing hyperlinks. More than 90% of successful cyberattacks start with a phishing email or text that includes a link.

    Before opening any link or verifying personal information, consider the source. Hover over the hyperlink to determine if it is from a legitimate sender. Many phishing attempts are very sophisticated and try to impersonate people whom individuals know.

    Good computer hygiene requires individuals to verify the source before offering information or accessing a link, especially if the email is coming from a non-DoD sender.

    Another key area of vulnerability concerns password use. Addresses, birthdays, or using the one password most dreaded by cyber security experts, PASSWORD123, can make accounts susceptible to attack. The use of memorable passphrases, crafting unique passwords for individual sites or applications, and passwords that are at least 15 characters long and use a combination of numbers, special characters, and uniquely spelled words are the least vulnerable. Password Managers offer the best defense against password cracking by cyber criminals.

    “And since many telework, home networks should also be protected,” cautions Miller. “Make sure you change the password on your home router regularly using a strong password.”

    The DoD relies on multi-factor authentication to protect networks on many applications. MFA is simply adding an extra step after the username and password to gain access to an app. This is enforced in the DoD with the use of a CAC card and a PIN. Many private .com sites offer various MFA options, including a PIN, a confirmation code sent to phones or email, or face or fingerprint recognition.

    Finally, up-to-date software is also a critical computer hygiene requirement. Rebooting DoD devices daily keeps security updates current. Developers push out security almost daily to defend against cyberattacks.

    DoD has made recent changes to make email encryption easy for users. DOD regulation (DoDI 5200.48_DAFI 16-1403) requires all controlled unclassified information (CUI) transmissions be encrypted. Emails sent on the DAF networks (@us.af.mil, @usspacecom.mil, and @spaceforce.mil address) are already encrypted. The Office of the Air Force Chief Information Officer (SAF/CN) has distributed guidance stating that only CUI emails going to non-DAF email address enclaves must be encrypted before sending in Outlook.

    The introduction of the Controlled Unclassified Information (CUI) Program has brought on some confusion among DoD employees. CUI replaced the use of “For Official Use Only” on documents containing critical information. In any case, CUI documents must be properly marked, sent only by encrypted email, and accessed only by those with a need-to-know.

    “Not all legacy marked “For Official Use Only” (FOUO) documents are now CUI. It is not an automatic one-to-one swap,” said Miller. “Some information previously marked as FOUO will qualify as CUI, but FOUO information must be assessed against the CUI Registry to determine if it is now CUI.”

    October is Cybersecurity Awareness Month, but employing a security-centric mindset should be an everyday practice and not just once a year. Cybersecurity hygiene is a critical daily need both in the workplace and at home.

    Threats evolve and change quickly. For the latest information, visit the Cybersecurity and Infrastructure Security Agency at https://www.cisa.gov.

    References:

    DOD INSTRUCTION 5200.48_
    OF THE AIR FORCE DEPARTMENT OF THE AIR FORCE
    INSTRUCTION 16-1403 CUI

    https://www.dodcui.mil/Home/Training/
    https://securityawareness.usalearning.gov/cui/help.html
    https://www.dodcui.mil/CUI-Registry-New/
    https://www.dodcui.mil/Frequently-Asked-Questions/

    NEWS INFO

    Date Taken: 10.12.2023
    Date Posted: 10.12.2023 12:51
    Story ID: 455623
    Location: WRIGHT-PATTERSON AIR FORCE BASE, NORTH DAKOTA, US

    Web Views: 113
    Downloads: 0

    PUBLIC DOMAIN