WEBVTT

00:00.412 --> 00:04.079
(dramatic bass-heavy music)

00:06.030 --> 00:08.200
- Cyber security awareness is critical

00:08.200 --> 00:10.820
to accomplishing the Army's mission.

00:10.820 --> 00:13.600
Without your knowledge, a
hacker could gain access

00:13.600 --> 00:17.500
to critical work information,
your personal information,

00:17.500 --> 00:19.860
who you're connected to, your passwords,

00:19.860 --> 00:22.450
bank account numbers, credit card info,

00:22.450 --> 00:24.350
and more than you can imagine in less time

00:24.350 --> 00:26.370
than it takes to watch a movie.

00:26.370 --> 00:29.060
Following safer cyber
practices is essential

00:29.060 --> 00:31.280
to protect critical information

00:31.280 --> 00:34.360
and personal identifiable information.

00:34.360 --> 00:37.523
Here are a few examples that
will help you do just that.

00:40.700 --> 00:44.060
In this scenario, a criminal
is practicing identity theft

00:44.060 --> 00:46.210
by using a card skimmer to extract

00:46.210 --> 00:48.763
personal information from
a Common Access Card.

00:50.520 --> 00:52.970
The card skimming device
allows the criminal

00:52.970 --> 00:54.940
to use copied information

00:54.940 --> 00:58.375
to gain unauthorized access to a building.

00:58.375 --> 01:01.625
(card machine beeping)

01:02.810 --> 01:04.070
Be vigilant.

01:04.070 --> 01:07.150
The best preventative
measure is to put your CAC,

01:07.150 --> 01:09.890
or lanyard away when
you leave your workplace

01:09.890 --> 01:12.100
so it is not visible to the public.

01:12.100 --> 01:14.750
CAC cards contain sensitive information

01:14.750 --> 01:16.770
and can make you a target.

01:16.770 --> 01:19.030
And also, if you notice suspicious people

01:19.030 --> 01:22.050
hanging around your
building entrances or exits,

01:22.050 --> 01:23.573
always report it to security.

01:28.289 --> 01:29.990
- Hey Summer, I haven't
seen you in forever.

01:29.990 --> 01:30.823
How are you?

01:30.823 --> 01:31.860
- Hey Candice, I'm doing great

01:31.860 --> 01:32.693
How about you?

01:32.693 --> 01:33.526
- Good.

01:33.526 --> 01:34.400
- What are you up to today?

01:34.400 --> 01:35.460
- Nothing, you wanna go to lunch?

01:35.460 --> 01:36.910
- Sure, sounds good.

01:36.910 --> 01:38.300
- First, you wanna take
a picture together?

01:38.300 --> 01:39.133
- Yeah, sure.

01:40.753 --> 01:42.260
(camera clicking)

01:42.260 --> 01:43.210
- Let's look at it.

01:44.150 --> 01:45.010
- Oh, that's cute.

01:45.010 --> 01:45.890
- Really cute.

01:45.890 --> 01:48.870
- Can you tag me in it
and drop our location?

01:48.870 --> 01:50.317
- Hmm.

01:50.317 --> 01:51.190
- [Summer Voiceover] I don't know

01:51.190 --> 01:53.150
if I should post this photo.

01:53.150 --> 01:54.890
Sharing the location will pinpoint

01:54.890 --> 01:56.770
our exact location at Eskan Village,

01:56.770 --> 01:59.440
providing too much
insight into our mission.

01:59.440 --> 02:01.270
Plus, if I tag Candice,

02:01.270 --> 02:04.370
it'll link us and our
precise location together.

02:04.370 --> 02:06.980
Also, there is a solider who walked by

02:06.980 --> 02:09.430
and his name and rank were on his uniform.

02:09.430 --> 02:12.153
I think this poses too big
of a security risk to post.

02:13.760 --> 02:15.750
- On second thought, maybe we shouldn't.

02:15.750 --> 02:16.583
- I agree.

02:18.720 --> 02:20.700
- When posting on social media,

02:20.700 --> 02:22.770
always exercise caution.

02:22.770 --> 02:24.870
Minimize location sharing because

02:24.870 --> 02:27.030
it alerts criminals of your whereabouts.

02:27.030 --> 02:29.620
Be cautious of sharing
details of where you work,

02:29.620 --> 02:31.510
live, or attend school.

02:31.510 --> 02:33.700
Make sure you educate your family

02:33.700 --> 02:36.090
so they know how to do the same.

02:36.090 --> 02:38.180
Please be cautious of tagging.

02:38.180 --> 02:39.630
It links together details

02:39.630 --> 02:41.990
of your relationships to your coworkers,

02:41.990 --> 02:44.013
family members and your friends.

02:49.820 --> 02:51.140
- Hey Seal, how are you?

02:51.140 --> 02:52.660
- I'm doing good, how about you?

02:52.660 --> 02:53.493
- I'm doing good.

02:53.493 --> 02:54.660
Weren't you going to Owasso?

02:54.660 --> 02:55.950
- Yes, actually, next week.

02:55.950 --> 02:57.630
- Well, don't forget to
get your travel devices

02:57.630 --> 02:58.640
scanned before you leave.

02:58.640 --> 02:59.473
- Will do.

03:01.990 --> 03:06.100
- Always follow a travel
preparation checklist.

03:06.100 --> 03:11.100
Before a TDY, request devices
designated for travel only.

03:11.170 --> 03:13.700
Have the help desk scan
all of your devices,

03:13.700 --> 03:16.823
and test your VPN
connectivity before the trip.

03:19.557 --> 03:21.500
[Seal Voiceover] I got plenty
of time to grab a drink

03:21.500 --> 03:23.900
and check my emails before
my connection flight.

03:24.964 --> 03:28.080
[Tiffany] Always maintain
situational awareness.

03:28.080 --> 03:30.840
Seek privacy when working on your devices.

03:30.840 --> 03:34.250
And be mindful of your
line of sight to others.

03:34.250 --> 03:38.353
Safeguard all your passwords,
PINs, and sensitive materials.

03:40.206 --> 03:42.323
[Seal Voiceover] Let me just
connect to the public WiFi.

03:43.330 --> 03:46.830
- Use a virtual private
network for connectivity.

03:46.830 --> 03:50.870
Never use public USB ports or public WiFi.

03:50.870 --> 03:53.640
They are not secure and could
put sensitive information

03:53.640 --> 03:54.670
at risk.

03:54.670 --> 03:58.970
Always use a Virtual Private
Network, or VPN, to connect.

03:58.970 --> 04:02.500
This protects and encrypts
any transferred data.

04:02.500 --> 04:05.720
And remember to log off and
disable all connectivity,

04:05.720 --> 04:08.360
such as Bluetooth, WiFi, and Airdrop

04:08.360 --> 04:10.173
when you are not using your device.

04:11.517 --> 04:12.950
[Seal Voiceover] On second thought,

04:12.950 --> 04:14.530
let me see if I can
find a more private area

04:14.530 --> 04:15.503
to check my emails.

04:20.850 --> 04:22.150
- Hey.

04:22.150 --> 04:24.470
- Hey, I see you made it
back, how was your TDY?

04:24.470 --> 04:26.790
- It was great, I'll tell
you all about it, but first,

04:26.790 --> 04:28.820
let me turn in my travel
devices to the help desk.

04:28.820 --> 04:30.170
- Okay, I'll see you later.

04:32.570 --> 04:35.990
- When coming back from a
TDY, return all travel devices

04:35.990 --> 04:38.770
to the help desk so they can be scanned.

04:38.770 --> 04:41.110
If you suspect any cyber attacks,

04:41.110 --> 04:44.030
or cyber tampering
occurred during your trip,

04:44.030 --> 04:47.360
always fill out a debrief
form describing the incidence

04:47.360 --> 04:48.193
in detail.

04:54.100 --> 04:56.200
- Hey, just returning in my travel device.

04:56.200 --> 04:58.620
- All right, thank you, I
can wave through the scan.

04:58.620 --> 04:59.453
Thank you.

05:02.789 --> 05:03.622
[Tiffany] Let's review the

05:03.622 --> 05:06.850
OCONUS Travel Cyber Security Tips.

05:06.850 --> 05:10.240
Start with your Travel
Preparation Checklist.

05:10.240 --> 05:13.970
Maintain Situational
Awareness at all times.

05:13.970 --> 05:17.430
Always use a Virtual Private
Network for connectivity.

05:17.430 --> 05:20.820
And always return travel
devices to the help desk,

05:20.820 --> 05:22.710
and request a scan.

05:22.710 --> 05:25.360
Please remember to fill
out the debrief form

05:25.360 --> 05:29.083
if you suspect any cyber attack
occurred during your trip.

05:29.930 --> 05:32.240
Remember, cyber security awareness

05:32.240 --> 05:34.440
is everyone's responsibility.

05:34.440 --> 05:37.770
We must ask ourselves
what consequences arise

05:37.770 --> 05:40.140
if our information is compromised.

05:40.140 --> 05:42.980
How will a cyber attack
affect our mission.

05:42.980 --> 05:46.540
What are the best practices
for preventing cyber attacks.

05:46.540 --> 05:50.110
Government civilians, military
personnel, and contractors

05:50.110 --> 05:54.780
must understand cyber threats
and exercise best practices

05:54.780 --> 05:56.937
to lower the risk of cyber attack.

05:57.789 --> 06:00.539
(dramatic music)

