Page 23 - Cybersecurity Career Guide for North Dakota
P. 23
Watch out for scams. Learn to identify email scams and shady websites. Know- ing a bogus email when you see one is tricky. The best ones look really convinc- ing, just like lots of other emails in your inbox. Phishing hackers are counting on people not paying close attention to emails and just clicking or answering without looking very hard at what they’re doing.
Be careful what you post. All the items you share on social media, for example, should reflect behaviors and language that you are willing to live with for years to come. Sketchy photos and dubious words from the past have come back to bite many people when college admis-
sions officers and prospective employers come into the picture. Mark Loepker, Di- rector of Education at the Cyber Center for Education and Innovation, observes, “If you think a yearbook’s going to haunt you, wait until they pick up all your Face- book posts.” Or Instagram posts. Or tweets or snaps.
Protect your privacy. As a texter or emailer, social media user, shopper, or just website visitor, we all must make choices all the time about what kind
of personal information to offer up as public or to keep private. The basic ques- tion involved in all of these choices is whether to trust the machine or person who is (apparently) on the other side
of our screen. And the best answer is usually no—or at least to put less trust in these exchanges than we usually do. Providing your bank with a home ad- dress, birthdate, and phone number might be okay, but in an online game chat room? No way!
Not only should you not trust people online, you should recognize that people won’t trust you online, either. “You say you are Harry Potter?” the login screen asks. “Prove it by telling me your user- name and password!” “Oh yeah,” you say to the fishy-looking email in your inbox, “You say you’re the Bank of Amer- ica? Show me your ‘https’ web address.”
And learning how many ways compa- nies use (and profit from) the data we share with them should give us all pause regarding the volume of personal infor- mation we let them gather when we buy their products and use their services.
Say no to drugs. Whatever your state’s laws say about the use of marijuana, let alone other recreational drugs, federal law continues to make it illegal. Many
private-sector employers follow federal law and will disqualify potential employ- ees for positive drug tests. And govern- ment security clearances require clean drug tests over extended periods of time.
Be cautious—and thrifty. Start moni- toring your bank accounts and credit cards so that you can spot identity theft that can create debt in your name. Avoid high consumer debt of your own—you don’t want your credit card balance to make it look like you could be bribed for access and information. How you spend your money will also be visible through your credit rating to anyone evaluating you for a possible job. Showing irrespon- sibility with your own personal finances will raise a flag for anyone trying to de- cide if you should be trusted with other people’s sensitive, personal data and re- sources. Whether using the internet now as a student or defending it in the future as a cybersecurity professional, keeping things clean online and IRL will always be the right approach.
Which leads us to cybersecurity careers. Indeed, establishing trustwor- thiness online is central to cybersecurity professionals’ work, but so is maintain- ing it offline. As it turns out, all of these best online security practices can set you on a path towards a career in cybersecu- rity. Learning how to build strong pass- words, distinguish real emails from phishing scams, and track how far your data can travel beyond the website you just gave it to can well serve as the basic training needed to launch you towards a career in cybersecurity. Knowing what can go wrong with your own online life is a great way to start thinking about how to prevent things from going wrong with other people’s online lives.
ISTOCKPHOTO.COM START-ENGINEERING.COM
23