Cybersecurity Awareness Month: Safeguarding communications in the field

By Mr. William B King (2nd Signal Brigade)October 25, 2017

Cybersecurity Awareness Month: Safeguarding communications in the field
1 / 3 Show Caption + Hide Caption – U.S. Army Spc. Justin Pelzer, a Command Post Node operator assigned to Charlie Company, 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, and Spc. Isaiah Myles, the CPN team chief, check the status of the network July 3, 2017 in Cincu,... (Photo Credit: U.S. Army) VIEW ORIGINAL
Cybersecurity Awareness Month: Safeguarding communications in the field
2 / 3 Show Caption + Hide Caption – U.S. Army Sgt. Kino Malone, a Single Shelter Switch team chief assigned to Charlie Company, 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, monitors network communications flowing through the SSS, Sept. 9, 2017 near Zagan, Poland. C ... (Photo Credit: U.S. Army) VIEW ORIGINAL
Cybersecurity Awareness Month: Safeguarding communications in the field
3 / 3 Show Caption + Hide Caption – (Photo Credit: U.S. Army) VIEW ORIGINAL

WIESBADEN, Germany -- October is National Cybersecurity Awareness Month and marks the kickoff of the yearlong Army Cybersecurity Awareness Campaign. The Army campaign is designed to increase readiness through improving awareness of cyber threats and incidents as well as their impact to Army missions. The Cybersecurity Awareness efforts also highlight how Soldiers and Civilians need to respond in order to safeguard the Army.

Chief Warrant Officer 2 Javier Vargas, a network management technician assigned to the 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, provides some tips for users operating in a tactical environment on how to help protect their equipment and our Army networks.

1. Patching, hardening, and updating systems. Bottom line, before you take computers, radios or other computer and communications equipment out to the field, ensure it is updated with the latest software, operating system and any security patches.

2. Properly configure baseband equipment for secure operation.

"Properly implementing port security at the switch will not only prevent unauthorized network access and cross-domain violations, but will allow the team to properly manage their network resources," Vargas explained. "Proper equipment configuration also allows teams to implement accurate, reliable and repeatable network management, which sets the foundation for network defense."

3. Be the subject matter expert on your equipment. As the primary user of any computer or other piece of communications equipment, ensure you understand fully how it operates on a day-to-day basis and are able to perform basic troubleshooting.

"Understanding the normal operation, capabilities and limitations of our tactical systems will help identify any abnormal network behavior and minimize the impact any attack may have on the network," Vargas said.

4. Have an end-user device update strategy in place. If you are going to be in a tactical environment for more than 30 days, be sure to coordinate with your local network enterprise center to receive new patches and updates for your computers.

5. In general, follow the same network defense strategies that are implemented in garrison. Don't plug in any personal or other unauthorized devices to a networked computer. If posting on social media, don't overshare and be sure to turn off geotagging.

"When properly followed, the cybersecurity tips and strategies that are recommended for garrison are as effective in tactical environments. Users that follow posted security guidelines and best practices will help reinforce the secure networking strategies already in place," Vargas said.

Nic Hall, 2nd Theater Signal Brigade information systems security manager and a former U.S. Marine Corps infantryman, explained the importance of protecting critical network infrastructure to support Soldiers in the field.

"Protecting these networks is essential to winning the fight out there. If the ground troops can't communicate, then they can't shoot and move and accomplish their objective," Hall said.

Editor's note: This is the third in a three-part series on Cybersecurity Awareness Month best practices for Army computer and network users in Europe.

For more information contact your unit information assurance, cybersecurity division, or S-6/G-6 Communications and Information Management section.

---

2nd Theater Signal Brigade conducts Department of Defense Information Network operations to enable mission command in support of U.S. Army, Joint and multinational operations throughout the U.S. European Command and U.S. Africa Command areas of operation.

Related Links:

Related Link

Related Link

Related Link

Related Link

Related Link