October Cybersecurity Month

Do Your Part | Be Cyber Smart

Be Cyber Smart

All around the Globe everyone is connected to the internet and sharing various information via websites, social media, and software. Every time you sign up for a software or social media or on some website you are required to give information, and in some cases, it requires sensitive information like credit cards and Social Security numbers. It important you are aware of what information you are sharing on the internet, and ensure you protect your accounts properly, and #BeCyberSmart. 

Start with the Basics 

  • Use Long and Unique Passphrase -  A strong passphrase is a sentence that is at least 16 characters long, easy to remember and includes numbers and special characters. Remember that your accounts may contain extremely sensitive information. If you choose a unique and long passphrase for each account, you will make it difficult for hackers to crack it. Have a unique passphrase for each of your accounts, e.g. 1L0veFood$C0ffee 

  • Use Multi Factor Authentication (MFA) in all accounts - MFA requires extra verification to access your accounts in addition to your password. Please setup MFA on your Kent State account with SMS as primary and Phone App in case you travel oversea without data to receive SMS. Most companies support MFA since it is an industry security standard. Use MFA on all your personal accounts that contain sensitive data. 

  • Use a Password Manager – Ditch the sticky notes with your passwords, using a good password manager is the safest way to keep track of your passwords, as they allow you to use unique and stronger passwords without needing to memorize for each account. Security experts recommend using password managers to keep your data safe. There are several good password managers in the market, you can research what is best and start using one soon. 

  • Keep Your Software Up To Date – Software updates are important to your digital safety and cyber security besides giving you the latest new features. The sooner you update, the more secure your device is since often it addresses software vulnerabilities that potentially could allow cyber criminals to exploit, infect or steal your data if not patched.  

  • Lock Devices When Not in Use- This helps prevent others from viewing or using your device when you are not paying attention. Set up your computer and mobile devices to automatically go to screensaver after a certain amount of inactivity. In addition, do not leave your device unattended in public space.  

  • Avoid Scams: 

    •  Block unwanted calls and text messages 
    •  Do not give your personal or financial information to any unexpected requests 
    •  Resist the pressure to act immediately (phone scammers technique) 
    •  Do not believe everything you see or read online 
    •  Fact-checking sources and verify with reliable experts       


Password Requirements


Take the quiz


Fight The Phish

The second week of Cybersecurity Awareness Month is all about educating yourself about how to “Fight the Phish.” It’s important to understand the signs of phishing and know what to do when you suspect you are being Phished. Phishing is a type of online scam where criminals use social engineering by sending out fraudulent email, text messages or even phone calls that appear to come from a legitimate source with the sole purpose of acquiring your personal or organizational information. With this information the bad actors gain access to different accounts and can exploit your more sensitive personal information. That’s why it’s always important to stay vigilant and Fight the Phish. If you want to learn more about Phishing, please go to https://phishtalk.kent.edu 

How can phishing affect you? 

  1. Loss of personal information and identity theft 
  2. Can lead to ransomware and malware infections 
  3. Possibility of financial loss and reputation damage 

Beware of the warning signs of a phishing attack and report it to phish@kent.edu

  • Attachments and links are one of the most dangerous content in a message, especially if you were not expecting it. Only open attachments/links that you are 100% sure are safe.  

  • Extensions: File extensions to be hazardous of are .EXE,.BAT, .HTML, .REG, .VBS, .ZIP, MSI 

  • Does the file attachment type make sense for what the message indicates?  Example: voicemail (mp3 or wav) but a .HTML is attached instead.  

  • If you were not expecting an email with an attachment, or it is not the normal protocol for that sender, verify it directly with the sender before opening. 

  • Does the attachment or link prompt you to login and provide credentials? If so, DON’T OPEN IT, DON’T CLICK ON IT and report the email to Phish@kent.edu

  • Look for misspelled words or grammatical errors. An email with a hyperlink that is a misspelling of a known website. For example:  "www.bankofarnerica.com" - the "m" is really two characters "r" and "n". 

How can you protect yourself from phishing? 

There are many ways you can help protect yourself from phishing.  

  •  Do not open attachments or link in emails and messages if not verified.  

  •  Hover over links, this is important, check the link address to make sure the address is legit.   

  • Educate yourself on how phishing works, and how to spot phish- https://phishtalk.kent.edu 

  • Setup Multi-Factor Authentication (MFA). 

  • Forward suspicious emails to phish@kent.edu 

Phishing is a very easy way for attackers to gain access to private information, but it’s also a very lethal method that can lead to a whole organizations data breach. To learn more about phishing tips, visit https://phishtalk.kent.edu 




Take the quiz


Cybersecurity Career Awareness

Welcome to Week 3 of Cyber Security Awareness Month. This week’s theme is about Cyber Security Careers. As the world gets more digitized, and cyber criminals are finding more ways to perform cyber-attacks and scams, the demand for cybersecurity jobs will only be on the rise. According to the U.S. Bureau of Labor Statistics it is projected that, “cybersecurity jobs will grow 31% through 2029”. With the higher demand in cybersecurity jobs, there will be no shortage of opportunities and necessity for those in the field.

Students Faculty Staff

Why Consider a Career in Cybersecurity? 

  • Cybersecurity careers have a wide variety of jobs that draw on skillset you may already have 

  • You will never be bored in the field of cybersecurity and has practically unlimited growth 

  • There is a high demand for skilled cybersecurity professionals with great salary and job flexibility 

  • Cybersecurity workers are part of problem-solving and a dynamic industry that makes a real impact 

The 5 Most In-Demand Skills for Cybersecurity Today  

  • Analytical & Problem-Solving Skills - Cybersecurity is all about solving problems.  A cybersecurity analyst’s job is to assess current risks and consider solutions to prevent, detect, and respond to cyber-attacks. This skill is also very essential with that of communication and critical thinking skills to resolve issues in a short and collective manner. 

  • Networking and IT Skills - While working with security issues on a given network or situation, it often requires one has some network and IT troubleshooting skills to analyze, resolve and prevent security issues from arising.

  • App Development Security Skills - It is particularly important for any technology company to have app developers adding and testing security features. The app developer requires in-depth knowledge of programming languages and problem-solving skills to help detect various threat vector and attack types. 

  • Threat Intelligence Skills -It requires a blend of analytical, technical and creativity skills to correlate, analyze, investigate, and prevent threats.

  • Cloud Computing skills- Companies are adapting cloud service at an alarming rate. Jobs are increasing for those who know how to configure and manage a virtualized environment along with its security.

3 Tips for Finding the Best Cyber Career for You

  • Find an area that you are interested in.

    • Cybersecurity jobs can be compared to a castle. Defenders must fill the castle’s weaknesses. Attackers assess the castle’s strength by attacking the structure. Engineers build the castle and management oversees, guides and lead operations. The SANS Institute has a site highlighting 20 coolest cybersecurity careers of 2021.

  • Create a plan to achieve your goals

    • Cybersecurity jobs require various levels of knowledge for various positions. Finding an interest, pathway and honing your skills are vital for success.

    • Cybersecurity career certifications are a good way to demonstrate your potentials and skills. Obtaining certifications in cyber security can help with finding a job and proving knowledge.

    • We created a LinkedIn Learning Path page for you to start discovering about Cybersecurity Career including job type, certifications, exam preps info. Make sure to sign into LinkedIn using your Kent State University Credentials in order to see the content.

  • Establish a goal

    • Cyber security is a vast field. There are many opportunities in the private sector, government, and public service. Establishing a goal will help guide you to the career you are pursuing.

    • The Kent State Security and Access Management team offers student analyst positions and internship opportunities, please apply now and we will notify when we have openings if you meet our qualifications.


Take the quiz

Cybersecurity First

Welcome to the fourth and final week of the Cybersecurity Awareness Month. This week is all about getting familiar with how you can continue to keep your information secure online no matter where you are.

Staying Safe at Work and Home 

  1. Practice Good Personal Cyber Hygiene:  
    1. Never send or share your password with anyone. 
    2. Use long and unique passphrase for each account, do not re-use passwords.
    3. Visit HaveIBeenPwned to see if your accounts have been compromised.
    4. Think before you click – always hover with your cursor to check the URL. 
    5. Use Multi-factor authentication on all accounts.  
    6. Set up security alerts on your bank accounts to notify you of transactions. 
    7. Don't save credit info to web sites, when a site is breached, your info is exposed
    8. If your bank account is breached, make sure to freeze your credit report visit: FrozenPii
    9. Never send or share sensitive information – ask why, who and what and always use encryption.  
    10. Delete sensitive information when you no longer need it.  
    11. Always keep software up to date and use anti-virus software on your computer. 
    12. Be aware of threats. Playing it safe online prevents you and your family from being exposed to risks on the internet that could harm you. 
  2. Smart Devices Need Smart Security:  
    1. Consider security when purchasing internet-connected devices.  
    2. When setting up a new device, make sure to set up security and privacy settings and update default passwords.  
    3. Make sure to use unique passwords
    4. Smart devices at times will have vulnerabilities, update software when available
  3. Sharing Less Is More 
    1. Secure home Wi-Fi with a strong password and restricts access. 
    2. Turn off Wi-Fi and Bluetooth to prevent your info from being tracked. 
    3. Many social media sites and apps will ask for your personal information but think carefully before you provide that info. 

Staying Safe While Traveling:  

  1. Always set up Multi-factor authentication on your accounts. (Make sure to have the Authenticator phone app method enabled so it will work when you have no cell service.) 
  2. Never connect to public Wi-Fi or a public computer to access your work or personal accounts.  
  3. Turn off location sharing on videos/photos that are posted on social media.  

Do you know how much your information is worth at dark web?

Want to learn more about the common cyber threats?

  • Visit the FBI's website to increase your knowledge and empower your cyber IQ. 

Wi-Fi Computer Theft Internet Downloading


Take the quiz

Cyber Security Awareness Month Logo 2021