01
SEPTEMBER 2025 Back to Basics with WSA Information Technology
ITSUPPORT@WSA.AERO
02
Cybercriminals are becoming increasingly aggressive, focusing on:
STOLEN LOGINS
These threats often target the aviation and manufacturing industries because of the critical nature of operations and the value of proprietary data.
COMPROMISES THROUGH VENDORS OR THIRD-PARTY SERVICE PROVIDERS
FAST-MOVING RANSOMWARE ATTACKS
03
Let’s stay sharp by following these essentials:
THINK BEFORE YOU CLICK
01
03
PROTECT YOUR IDENTITY
NEVER SYNC YOUR PHONE TO A RENTAL CAR
02
04
VENDOR AWARENESS
04
USE UNIQUE, COMPLEX PASSWORDS
AVOID REUSING CREDENTIALS ACROSS WORK AND PERSONAL ACCOUNTS
For example, a password leaked from a social media site could be used by criminals to try and access your company email. Enable multi-factor authentication (MFA) on all accounts—preferably app-based authentication or hardware security keys.
Protect Your Identity
05
Never Sync Your Phone to a Rental Car
When you connect your mobile phone to a rental car via Bluetooth or USB, your personal data— such as:
CONTACTS
CALL HISTORY AND TEXTS
STORED LOCATIONS
-may remain in the car’s system after you return it. This puts your sensitive information at risk of being accessed by the next driver. Do not sync your personal or company phone to rental cars.
06
Think Before You Click - QR-code scams are on the rise.
This includes QR codes on packages, posters, parking meters, or flyers. Do Not Scan Random QR Codes
01
They do this to steal credentials or install malware Criminals embed malicious links in QR codes
02
Verify the Source
03
If you receive a QR code in an email or text, verify the source first—type the known website addresses directly into your browser instead.
07
Vender Awareness
In previous attacks, malicious actors disguised as delivery personnel connected rogue devices to corporate systems in under 30 SECONDS 30 SECONDS.
ONLY USE APPROVED USB DRIVES or external devices provided by IT. Never plug in devices found in conference rooms, parking lots, or received from unverified sources. ALWAYS ESCORT NON-BADGE HOLDERS OR CONTRACTORS and ensure their work areas are monitored.
01
02
08
Final Message: Stay alert and always report suspicious activity. One careless click or overlooked update can give an attacker the access they need. In Outlook, use the “Report Phishing” button on suspicious emails— do not forward them. If something seems unusual, even if it appears to come from a known contact, stop and verify before acting.
ITSupport@wsa.aero
Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8Made with FlippingBook Annual report maker