Call for nominations: UCL Cyber Security and Data Protection Awards 2024
By Daniela Cooper, on 1 May 2024
Do you know someone who deserves recognition for their support in making UCL a more secure place to study and work? If you do, please nominate them for a UCL Cyber Security and Data Protection Award.
The awards recognise the above and beyond work that our staff and students do to help keep UCL safe and secure.
Award Categories:
- Above and Beyond Award – An individual who has gone out of their way to be helpful or proactive in a cyber security activity.
- Keeping UCL Safe Award – An individual who has made a difference to the cyber safety of UCL.
- Departmental Award for good security citizenship – An individual who has been a good cyber security citizen and role model.
- Data Protection Award – An individual who has gone above and beyond to develop how UCL protects personal data.
- Annual CISO Research Collaboration Award – For the academic or researcher who has done exceptional work in bridging the research to practitioner gap.
How to make a nomination:
Please contact the UCL Information Security Group to make a nomination: isg@ucl.ac.uk. Include your reasons for nominating and the category.
The deadline for submissions is the 30th May.
The awards ceremony will take place as part of the UCL Cyber Security and Data Protection showcase event in June and will be presented by the Provost. This is an invite only event, award winners will be contacted in advance with an invitation for the event.
Suspicious software: how to spot legitimate downloads from malicious downloads
By Peter Andrews-Briscoe, on 30 April 2024
In the realm of online security, one major threat that every institution and person should be wary of is the threat of downloading malware that is presented to look legitimate. This attack vector of using malware to look (and often even act) like wanted software is common enough to even have a name – this type of malware is known as a Trojan. Oftentimes, incidents involving Trojans underscore how skilled hackers can be at presenting their software as the correct software for installation, and without the right knowledge, it can often be hard to distinguish what is the difference between wanted and unwanted software. This blog aims to give some easy ways to protect against unwanted software.
There are a few factors and red flags to be aware of, when downloading software.
- Sponsored search results do not always mean safe search results: It is commonly believed that sponsored search results will be safer than any other search result. However, cybercriminals often invest in those spots to give their code a stronger veneer of legitimacy; sponsored results, therefore, should be treated with the same caution as any other result. For example, shown in here is a malicious sponsored add for software called Trello:
- There may be misleading download buttons on web pages: When downloading software, it can be the case that there seem to be multiple download buttons, each of which leads to a different download. This is a red flag, that should lead to questioning the veracity of the site.
- The importance of checking the URL for authenticity: A URL can provide clues about the legitimacy of a site. Be wary that the URL does not contain misspellings of well-known sites (such as appl.com instead of apple.com), or that use uncommon top-level domains (instead of the usual .com, .co.uk, etc.). Cybercriminals often use misspelt URLs to host their malicious code.
- There can be unprofessional website design and poor grammar: Legitimate companies will put effort into maintaining a professional and polished website. If a site contains spelling mistakes and poor grammar, it could very easily be a site designed to distribute malicious software. However, many malicious sites maintain a professional veneer, too.
- Unrealistic promises or too-good-to-be-true offers: If you find a site that promises a piece of software for a severely reduced price than elsewhere, or that has amazing features for a low cost or free, it’s worth investigating further. Hackers often try to entice you to download their software by creating very enticing offers that would be impossible to match elsewhere.
On top of this, there are easy ways to minimize the risks involved in downloading third party software, above and beyond having a vigilant eye. The following steps will help you defend against any Trojan viruses:
- Download software directly from the official source where possible: Whenever possible, download any software you need from the official sources and vendors (such as downloading Microsoft Office from the official Microsoft page, for example). You can download a lot of software from the UCL software database: https://swdb.ucl.ac.uk/.
- Research the software through reputable sites: Before downloading any software, be sure to research it on reputable technology review sites and forums. These platforms often can help you decide on what software is best to use, and help you avoid bogus software.
By keeping these points in mind, you will be able to decrease the risk in your online life, and keep your devices secure.
CybSafe training now available for students
By Peter Andrews-Briscoe, on 20 March 2024
In response to the need to safeguard yourself and UCL from ever increasing threats, the Information Security Group is rolling out their staff information security training to students.
A crucial aspect of cybersecurity is not just the technology we use but also how we interact with it. As technology evolves, the primary challenge often lies in training our ability to recognize the more nuanced signs of potential threats. Enhancing awareness and understanding of common cyber threats is, therefore, the easiest way to safeguard yourself and your friends online.
The training is delivered by a third-party company called CybSafe. You should all receive an email from donotreply@cybsafe.com, inviting you to join their platform. The modules are designed to help you detect threats in your day-to-day life, as well as when you interact with UCL systems, ensuring the safety of both you and UCL.
You can find the training here, where you will be able to log in with your normal UCL credentials:
https://app.cybsafe.com/sso-login/ucl/
If you have any questions about the training or security in general, please feel free to reach out to us at isg@ucl.ac.uk. We are here to address any concerns and help bolster our collective cybersecurity defences.
Navigating QR Code Security in a Contactless World
By Peter Andrews-Briscoe, on 30 October 2023
In the digital age, QR codes have emerged as a convenient tool for quickly accessing information with just a scan – whether it’s viewing a restaurant’s menu, connecting to Wi-Fi, or making a quick payment. Since the world went contactless over the pandemic, many of us will have had experiences of using them. Yet QR codes can just as easily be used by scammers for hostile purposes. These attacks can be simple enough, consisting of placing a QR code in a public place, such as on posters advertising products or placed in seemingly random areas to pique your curiosity. Instead, though, the code will direct you to a malicious link.
So what makes QR code scams so effective?
- Curiosity: An intriguing QR code left in a public place can easily attract someone’s attention, either by presenting itself as an advertisement, or placed without any context to pique someone’s curiosity.
- Unassuming: Unlike traditional phishing emails or messages, QR codes are faceless. A person can easily have seen enough phishing emails to know how to spot one, but QR codes are a far newer phenomenon, and give away far less information on the surface. This can also make them appear less threatening, not having enough details to arouse suspicion.
- Immediacy: Scanning a QR code takes mere seconds, giving individuals less time to think critically about the action they’re taking.
Fortunately, there are ways to safeguard yourself against QR code scams:
- Be Sceptical: Always think twice before scanning a QR code from an unknown source. Even from a source that seems safe (such as a QR code on a parking meter) can be a fake code placed over the real one.
- Preview the Link: Some smartphones and QR code reader apps offer a feature that allows you to preview the URL before it opens. You can use it to see if the link looks suspicious, which should help you determine if it’s malicious or not.
- Keep Software Updated: Always ensure your mobile operating system and security software are up-to-date, as updates often include fixes for newly discovered vulnerabilities, making your device more resistant to any malware.
- Report Suspicious Codes: If you encounter a suspicious QR code, report it to local authorities to prevent others from falling victim to the scam.
QR codes have simplified many aspects of our life, but as with any technology, they come with risks. By being vigilant and taking appropriate precautions, you can enjoy the benefits of QR codes without falling prey to the hidden dangers.
Cyber Security Awareness Month – Week Four
By Daniela Cooper, on 24 October 2023
It’s the fourth and final week of Cyber Security Awareness Month. This week is all about updating your software. It’s an easy one to forget or to put at the bottom of your To Do list, but it’s an important one as it provides an easy gateway for malicious attackers to get in and compromise your computer. Don’t forget to enter the week four quiz for your last chance to win a £25 Amazon voucher.
Software Updates
- Tip: If you connect it, protect it. Outsmart cyber criminals by regularly updating your software.
- Any device that connects to the internet is vulnerable to risks. The best defence is to keep device security software, web browsers, operating systems and applications up to date. Turn on auto-updates!
- All those update alerts from your software are important to install! Not only do they fix things that might be buggy, but they also patch up any security flaws.
- Pay attention to software update alerts and set your software to auto-update–it’s an easy way to keep things safe. Set it and forget it!
- Outsmart cyber threats! Hackers are always looking for vulnerabilities to exploit. Stay ahead by enabling automatic software updates. Stay safe, stay updated!
- The power of timely updates! Automatic software updates work silently to protect your devices. Say goodbye to outdated software and embrace the power of the latest features, enhanced performance, and tightened security.
Recap of topics covered in this Cyber Security Awareness Month – 4 simple ways to keep your online life more secure:
- Use strong passwords and download a password manager
- Turn on multi-factor authentication
- Recognise and report phishing and
- Update your software.
Cybersecurity is everyone’s job – including yours. We all have a role to play in keeping our interconnected world safer and more resilient for everyone.
Remember to complete your CybSafe training
A quick reminder that if you haven’t completed your CybSafe training, please do so here:
https://app.cybsafe.com/sso-login/ucl/
The training can now also be found on InsideUCL: https://app.ucl.ac.uk/InsideUCL/
CybSafe contains a wealth of knowledge including a news feed, a knowledge base and the ability to share videos with friends and family.
Week Four Quiz
Be in with a chance to win a £25 Amazon voucher by answering the question below:
Q: What four things do you need to keep up-to-date?
Please send your entries to isg@ucl.ac.uk with the subject line: CSAM Week Four. The quiz is only open to UCL staff and students who enter using their UCL email address.
For more information on how to protect yourself, your friends and your family see: https://staysafeonline.org
Cyber Security Awareness Month – Week Three
By Daniela Cooper, on 17 October 2023
Passwords and Password Managers
It’s week three already! This week is all about passwords and password managers and how important it is to take care to create strong passwords and use password managers to help you store them securely. Also, don’t forget to enter the week three quiz to be in with a chance to win a £25 Amazon voucher.
- Did you know the average person has more than 100 passwords at any given time? Here’s an easy tip: a Password Manager can help you create strong, unique passwords for each account.
- No matter the account, all passwords should be created with these 3 words in mind: Long, Unique (never reuse passwords) and Complex (a combination of upper- and lower-case letters, numbers, and special characters).
- What are some of the advantages of a password manager? They…
- Save time
- Generate strong passwords
- Identify weak passwords
- Organize your ever-growing list of online accounts with a password manager. They can manage all your online credentials like usernames and passwords, storing them in a safe, encrypted database and generating new ones when needed.
- Lock it up! Strong passwords are your first line of defense against cyber threats. Don’t settle for weak combinations. Create unique and complex passwords for each account and consider using a password manager for added convenience and security.
- Avoid common password pitfalls! Hackers love easy targets, so don’t make it easy for them. Say no to password123 or QWERTY. Opt for unique and complex passwords – let a password manager do the heavy lifting for you. It’s time to level up your security.
Reminder to complete CybSafe training
A quick reminder that if you haven’t completed your CybSafe training, please do so here:
https://app.cybsafe.com/sso-login/ucl/
The training can now also be found on InsideUCL: https://app.ucl.ac.uk/InsideUCL/
Week Three Quiz
Be in with a chance to win a £25 Amazon voucher by answering the question below:
Q: What three words should you keep in mind when creating passwords?
Please send your entries to isg@ucl.ac.uk with the subject line: CSAM Week Three. The quiz is only open to UCL staff and students who enter using their UCL email address.
For more information on how to protect yourself, your friends and your family see: https://staysafeonline.org
Cyber Security Awareness Month – Week Two
By Daniela Cooper, on 10 October 2023
Week Two: Phishing
The topic for week two is Phishing! I know this feels like a topic that we are always banging on about, but there is a reason for that, it’s such an easy way for an attacker to get in and it’s such an easy thing for us to overlook when we’re feeling tired or overwhelmed with our workload. So at the risk of boring you with a topic you may already be familiar with, please know that we all need a reminder of what to look out for, accidentally clicking on a phishing email could happen to any of us! Oh and don’t forget to enter our week two quiz to win a £25 Amazon voucher.
- Reporting a scam helps warn others against cyber incidents. Don’t hesitate to call out phishing attempts.
- Most cyber incidents start with a phish. To stop it, report it. For UCL email accounts please report to phish@ucl.ac.uk.
- Tips for Spotting a Phishing Attempt:
- 1) They create a sense of urgency or claim to need help.
- 2) A promise of reward.
- 3) Suspicious sender – often the address sending the email will not look right, or might try to mimic a well-known company address, perhaps with a few typos or extra characters.
- 4) They ask for personal or financial info.
- 5) They want you to download a file or click on a link. Don’t take the bait!
- Think before you click! Phishing emails disguise themselves as harmless messages, but they’re dangerous digital piranhas swimming in your inbox. Stay vigilant, spot the signs, and report suspicious emails. Together, we can stay safe!
- Don’t get hooked! Phishing emails are sneaky bait trying to reel you in. Learn how to spot and report them.
- Your inbox is your fortress! Phishing emails try to breach your defenses, but you can outsmart them. Learn the telltale signs of phishing, such as misspellings, suspicious attachments, or urgent requests, and report those fraudulent messages. Protect yourself and others!
Reminder to complete CybSafe training
A quick reminder that if you haven’t completed your CybSafe training, please do so here:
https://app.cybsafe.com/sso-login/ucl/
The training can now also be found on InsideUCL: https://app.ucl.ac.uk/InsideUCL/
Week Two Quiz
Be in with a chance to win a £25 Amazon voucher by answering the question below:
Q: For UCL email accounts, what email address should be used for reporting phishing emails?
Please send your entries to isg@ucl.ac.uk with the subject line: CSAM Week Two. The quiz is only open to UCL staff and students who enter using their UCL email address.
For more information on how to protect yourself, your friends and your family see: https://staysafeonline.org
Cyber Security Awareness Month 2023
By Daniela Cooper, on 3 October 2023
Week One – Multifactor Authentication
With Summer feeling like a lifetime ago, it’s already October, which can only mean another Cyber Security Awareness Month. We will also be running the weekly quiz to win a £25 Amazon voucher so read on to enter and be in with a chance to win.
This year the topics are based on Cyber Security Behaviours and are as follows:
- Multifactor Authentication
- Phishing
- Passwords and Password Managers
- Software Updates
There is nothing new about these topics and there is a reason why they are always repeated, they are four fairly simple behaviours that when implemented really help to protect you.
Multifactor Authentication
- Make it harder for cybercriminals to compromise your accounts by enabling multifactor authentication.
- Multifactor authentication adds an extra layer of protection to your accounts, making it harder for hackers to get in. Stay one step ahead and lock them out.
- Where should you use MFA?
- On accounts with your financial info like banks and online stores
- On accounts with personal info, like social media and healthcare apps
- On accounts with info you use for work
In summary: Use MFA everywhere!
- Passwords are the frontline gatekeepers of your online kingdom! But why settle for one line of defence when you can have two? Multifactor authentication doubles the security, making your accounts much more fortified. Keep the cyber criminals at bay!
Reminder to complete CybSafe training
A quick reminder that if you haven’t completed your CybSafe training, please do so here:
https://app.cybsafe.com/sso-login/ucl/
Week One Quiz
Be in with a chance to win a £25 Amazon voucher by answering the question below:
Q: What are the frontline gatekeepers of your online kingdom?
Please send your entries to isg@ucl.ac.uk with the subject line: CSAM Week One.
For more information on how to protect yourself, your friends and your family see: https://staysafeonline.org
Are you interested in becoming a Security Champion?
By Daniela Cooper, on 21 September 2023
Did you know that over 80% of data breaches are caused by Human error? With so many emails and so much data to send and process, it can be easy to mistakenly send an email to the wrong person which is the cause of many data breaches. It’s just as easy to click on a link without considering whether it came from a safe sender, or to not see the signs of a spoofed email that appears as if it’s from a colleague.
Increasing awareness of these issues and others like them can be one of the most effective ways to promote defence against cyber attacks and to reduce data breaches. For this reason, at UCL we are recruiting Security Champions who will help us with promoting awareness, as well as providing us with a link to all the different faculties and departments within UCL.
What is a Security Champion?
A Security Champion is someone who works within their department in order to promote cyber security awareness. This is done in a variety of ways, including distributing messages, content and reminders locally to their department.
In order to prepare for this role, a Security Champion is given a briefing from the Information Security Group and the Data Protection team so that they can familiarise themselves with the available resources, objectives and themes of the programme. Following this they can introduce themselves to their department in their new role and outline their plans. Throughout the role, periodic training and briefings are provided to ensure that they can stay up to date on available content and resources.
As part of the ongoing role, Security Champions are expected to:
- Attend meetings within their departments to promote security and raise any discovered issues.
- Deliver messages and other content throughout the term as friendly reminders to remain vigilant against suspicious communications.
- Attend Security Champions network meetings with other departments in order to report back, share ideas and receive updates.
If this sounds like something you would be interested in, then please contact us at ISG via our email address: isg@ucl.ac.uk. Please be aware that this role is expected to take up approximately one day per term. At present, this role is for staff only.
How to distinguish between real and phishing bill payments
By Peter Andrews-Briscoe, on 20 June 2023
One of the key dangers in the world of cybersecurity are phishing emails. Even with all the defensive tools available, it’s easy for any person to slip up and click on a file or a link by accident. In this post, we’ll talk about a particular kind of phishing we’ve recently seen an increase in: hiding malware in fake financial documents.
How to spot a phishing email
Attached below is an example of one of these phishing emails we have had reported to us recently:
Looking at this, there are a few details that would indicate it’s phishing to someone who knows what to look for.
Firstly, the email is addressed to “Customer” – quite often, phishing emails will use generic greetings such as this, as they’ll send the same email to hundreds of people or more. However, it should be noted that not all phishing emails use this tactic, and many will be more personalised in their attacks.
Secondly, the email is vague about what it is about, besides the fact it is related to a payment. This has the effect of making the recipient more curious, and therefore more likely to click on the malicious file. On top of this, by keeping it vague, fewer people who receive it will dismiss it as unrelated to them.
On top of these, there are quite a few markers as well that might distinguish a message as phishing:
- A sense of urgency and fear – a phishing email may try to make you feel rushed or suggest that you may be in trouble. This is so that you don’t have the time to wonder if it might be legitimate.
- A promise of reward – often, emails will get people to click on their links with a promise of reward, such as claiming they have won the lottery.
- Suspicious sender – often the address sending the email will not look right, or might try to mimic a well-known company address, perhaps with a few typos or extra characters.
- Typos – legitimate, professional emails, especially those concerning financial transactions, will be proofread carefully by the company sending them. Too many typos can be a sign of phishing.
- Suspicious web links – alongside attachments, phishing emails may include links that take you to harmful sites. These can often be made to look like legitimate links, so always be sure to hover over the link to see where it is taking you before clicking on it.
- Asking for information – phishing emails will often ask for information that no legitimate email would ask for, such as usernames or passwords.
How to protect yourself from phishing
- Verify the sender – if you receive an email from a company regarding a payment that you’re not confident in, be sure to contact the company to verify this. You should contact them via a trusted number or email, rather than responding to the email directly.
- Don’t open URLs or suspicious attachments – don’t open attachments or links in an email you have doubts about. You can send it to ISG at isg@ucl.ac.uk for help determining if an attachment or link is malicious.
- Keep your computer’s operating system, antivirus and applications up to date – this will increase the chances of catching any malware if it gets on to the computer, and updating the operating system will reduce the number of vulnerabilities the malware will be able to exploit.
Remember, staying safe online is a continuous process that requires ongoing vigilance – it is better to be safe and report any suspicious emails to ISG (isg@ucl.ac.uk) than to accidentally fall victim to a phishing email.