Cybersecurity Awareness Month
October is Cybersecurity Awareness Month, a time to focus on protecting ourselves and our organization from evolving cyber threats.
Cybersecurity Awareness Training is forthcoming. When available, employees will be automatically enrolled in MyPLN.
In addition to the required training, we’re highlighting four critical topics this month to help build a stronger, more resilient security culture:
Week 1: Social Engineering – The Human Factor
Cyber attackers often bypass technical defenses by targeting people directly. Social engineering tactics, like phishing emails, phone scams, or impersonation exploit human trust to gain access to sensitive information.
Stay protected by:
-
Verifying requests for sensitive information
-
Using strong, unique passwords
-
Locking your computer when unattended
-
Reporting lost/stolen devices or suspicious activity promptly
Week 2: AI-Powered Scams – A New Threat Frontier
Artificial intelligence is making scams harder to detect. AI-generated emails, voice clones, and fake content can mimic real people and organizations with alarming accuracy.
What to watch for:
-
Messages that seem slightly “off” in tone or timing
-
Urgent requests for money, login details, or personal info
-
Unknown callers using familiar voices or urgent scenarios
-
When in doubt, verify the request using another method—don’t rely solely on email or phone.
Week 3: Ransomware – Don’t Let It Hold You Hostage
Ransomware locks your data and demands payment to release it. Even one misclick can bring systems to a halt.
Prevent ransomware by:
-
Avoiding suspicious links or attachments
-
Backing up files to approved storage regularly
-
Being cautious of unexpected emails—even from known contacts
-
Reporting suspicious messages immediately
Week 4: Reporting Incidents – If You See Something, Say Something
Recognizing a threat is only part of the equation. Timely reporting helps contain and minimize damage.
Examples of what to report:
-
Phishing emails – use the “Report” button in Outlook
-
Suspicious persons in restricted areas
-
Unknown USB drives – never plug in unfamiliar devices
-
Unusual phone calls requesting sensitive information