Delaware State Courts
   home | feedback 
  search
Delaware State Courts.  The Official Website of the Delaware Judiciary
Delaware State Courts

 Administrative Office  of the Courts Home

 Delaware Docket  Table of Contents

 Delaware Docket  Issue List

Delaware Docket Newsletter

Making Cyber Security Training Work For You

Lessons learned through the cyber security training should be applied to home computers as well in order to ensure protection of personal information. This is particularly important since the internet email systems offer far less filtering protection than that which is employed by DTI. Here are some rules to consider:

  • Keep your Anti-virus application patched and up- to-date.
  • Use good Anti-spyware/Malware application (i.e. ADAWARE, SPYBOT, etc.).
  • Investigate the filtering capabilities of your internet mail provider.
  • Be aware of your family's email and websurfing habits.

A recent change in focus on tactics deployed in the war against cyber crime places an emphasis on educating users about viruses, malware, SPAM, spear phishing, including cybercriminals' use of financial information. The emails typically come from what looks like a bank or other financial institution asking the recipient to go to a website to enter personal or confidential data. However, the website is bogus, created to match the real site as closely as possible to fool the user into entering personal or confidential data. Once the data is compromised, it can be used for almost any purpose.

Recently, the Judicial Information Center, in conjunction with the Department of Technology and Information (DTI), launched an initiative to educate state computer users about cyber crime and security. The focus is on heightening awareness about the impact and potential of breaches in cyber security in our jobs.

A computer-based training was created for users to familiarize users with these potential pitfalls so that they can recognize and avoid them if encountered. Opening an attachment, entering a link embedded in an email, executing an .exe file or merely opening an email that lures the user with phrases like: "YOU HAVE BEEN SELECTED," "SOMEONE IS LOOKING FOR YOU," "YOU ARE OWED MONEY BY THE FEDERAL GOVERNMENT,"and "REGARDING YOUR RECENT COURT APPEARANCE," are all common subject lines that hackers use to disguise their malicious intentions.

bottom