IT September 2025 Flipbook

01

SEPTEMBER 2025 Back to Basics with WSA Information Technology

ITSUPPORT@WSA.AERO

02

Cybercriminals are becoming increasingly aggressive, focusing on:

STOLEN LOGINS

These threats often target the aviation and manufacturing industries because of the critical nature of operations and the value of proprietary data.

COMPROMISES THROUGH VENDORS OR THIRD-PARTY SERVICE PROVIDERS

FAST-MOVING RANSOMWARE ATTACKS

03

Let’s stay sharp by following these essentials:

THINK BEFORE YOU CLICK

01

03

PROTECT YOUR IDENTITY

NEVER SYNC YOUR PHONE TO A RENTAL CAR

02

04

VENDOR AWARENESS

04

USE UNIQUE, COMPLEX PASSWORDS

AVOID REUSING CREDENTIALS ACROSS WORK AND PERSONAL ACCOUNTS

For example, a password leaked from a social media site could be used by criminals to try and access your company email. Enable multi-factor authentication (MFA) on all accounts—preferably app-based authentication or hardware security keys.

Protect Your Identity

05

Never Sync Your Phone to a Rental Car

When you connect your mobile phone to a rental car via Bluetooth or USB, your personal data— such as:

CONTACTS

CALL HISTORY AND TEXTS

STORED LOCATIONS

-may remain in the car’s system after you return it. This puts your sensitive information at risk of being accessed by the next driver. Do not sync your personal or company phone to rental cars.

06

Think Before You Click - QR-code scams are on the rise.

This includes QR codes on packages, posters, parking meters, or flyers. Do Not Scan Random QR Codes

01

They do this to steal credentials or install malware Criminals embed malicious links in QR codes

02

Verify the Source

03

If you receive a QR code in an email or text, verify the source first—type the known website addresses directly into your browser instead.

07

Vender Awareness

In previous attacks, malicious actors disguised as delivery personnel connected rogue devices to corporate systems in under 30 SECONDS 30 SECONDS.

ONLY USE APPROVED USB DRIVES or external devices provided by IT. Never plug in devices found in conference rooms, parking lots, or received from unverified sources. ALWAYS ESCORT NON-BADGE HOLDERS OR CONTRACTORS and ensure their work areas are monitored.

01

02

08

Final Message: Stay alert and always report suspicious activity. One careless click or overlooked update can give an attacker the access they need. In Outlook, use the “Report Phishing” button on suspicious emails— do not forward them. If something seems unusual, even if it appears to come from a known contact, stop and verify before acting.

ITSupport@wsa.aero

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8

Made with FlippingBook Annual report maker