Cybersecurity Awareness - May 2025


Article Body

NEED TO KNOW NEWSLETTER     |     MAY 2025

 

Zip, zap, dont click on that!

 

 

 

Knowing the different types of domains helps you stay safe online. The last part of a website address, called the top-level domain (TLD), can indicate if a site is trustworthy. By recognizing these domains, you can avoid scams and other online threats. For example, .zip and .mov are often used by hackers to hide harmful links.

Parts of a URL

 

Protocol: First, the Protocol is where you will see https:// or http://. The Hypertext Transfer Protocol (HTTP) requests the website's contents and lets you see them. Make sure your connections use HTTPS — the S stands for secure. HTTPS encrypts your browser connection, making it more difficult for hackers to steal your data. HTTPS connections can be identified by the lock icon next to the URL.

Top-Level Domain (TLD): When you type in a website address, the last part after the dot is a top-level domain, like .com, .org, and .net. There are also country-specific domains, like .uk and .au. There are over a thousand top-level domains currently in use.

Google recently released several new top-level domains, including fun ones like .phd and even .dad for fathers who want to start a blog.

Two new Domains are causing a lot of concern in the cybersecurity community: .mov and .zip. These are now common file types. We’re seeing more of them being used by hackers in phishing emails.

 

Essential tips about opening links and attachments in your email.

1. Always investigate links and attachments in emails you receive. You can hover your mouse over the link and see where it will take you. If anything is suspicious, avoid that link!

2. Verify the sender. Look at who sent you the email, both the display name and the domain they are sending from. This is a big giveaway of who the author of the email is. If it looks off, it probably is!

Cybersecurity roles — Digital forensics analyst

Have you ever wondered what a digital forensics analyst does? Digital forensics analyst
Digital forensics analysts help recover damaged or deleted data like documents, photos, emails from computer or mobile devices, hard drives and other data storage devices, such as zip folders and flash drives. They carefully follow the chain of custody rules for digital evidence and provide evidence in acceptable formats for legal proceedings. Digital forensics analysts are especially important when investigating data breaches and criminal activity.
 
3. Contact the sender in a different manner or a new email. This way, if it is legitimate, you can verify it.

4. Let your IT or security team know immediately. . If it isn’t, you just helped save your organization from a breach!

 

Use your bookmarks

Saving your most used websites to your bookmarks is both convenient and safe. When you use your saved bookmarks to head to a website, you ensure you are going to a safe page and not stumbling onto a fake one.

 

For example: You receive an email that says you have been sent a shared file from a coworker using Google Drive or SharePoint. There’s a link. But instead of clicking on the link in the email, you use the bookmarked link to where you store data and log in that way.

Hackers send links that look real.
When you put your username and password into a realistic login page, they can collect your credentials.

 

This is where using your Bookmarked pages can help you avoid the trap!

 

 

Cybersecurity roles — Digital forensics analyst

Have you ever wondered what a digital forensics analyst does?

Digital forensics analyst
Digital forensics analysts help recover damaged or deleted data like documents, photos, emails from computer or mobile devices, hard drives and other data storage devices, such as zip folders and flash drives. They carefully follow the chain of custody rules for digital evidence and provide evidence in acceptable formats for legal proceedings. Digital forensics analysts are especially important when investigating data breaches and criminal activity.