FORT LEONARD WOOD, Mo. — Fort Leonard Wood will participate in a Command Cyber Readiness Inspection, from July 17 to 28, and teamwork across the installation is essential to a successful outcome.

The CCRI is a rigorous inspection of the networks and traditional security practices, designed to validate the effectiveness of the protection mechanisms that safeguard the Department of Defense Information Network from cyberattacks and to ensure the confidentiality, integrity and availability of defense information data and services.

Cyber vigilance in the workplace is everyone’s responsibility, and in line with that, inspectors will assess different areas of the networks and day-to-day employee workplace operations.

Leaders at all levels here are asked to ensure awareness and compliance with cyber security measures. Below are some tips network users should follow:

  • Review the Army IT User Agreement. It contains all the basics to remain compliant when using government computer systems. Mobile device users should also review the Addendum User Agreement tailored for the device usage.
  • At the conclusion of the business day, log computers off the NIPRNet system and reboot at the beginning of the next duty day to ensure security patch compliance.
  • Power on and log in to SIPRNet systems at least twice weekly. Staying connected for no less than six hours during those days is essential to systems getting the required updates.
  • Do not pass any information, especially critical operational traffic, over unclassified communications, such as phone, email or social media.
  • Remove common access cards, SIPR tokens and secure all SIPR drop lockboxes and hard drives prior to leaving computers unattended.
  • Do not plug unauthorized electronic devices, including thumb drives, hard drives, portable media players or cell phones, into a government NIPRNet or SIPRNet computer system unless you have an approved exemption letter.

Below are some traditional security measures:

  • Know who your security manager, information management officer and information assurance support officer are and how to contact them.
  • Verify security clearances and escort unauthorized personnel.
  • Properly safeguard classified systems, to include proper completion of applicable forms, including Standard Form 700 (security container information), SF 701 (activity security checklist) and SF 702 (security container check sheet).
  • Use proper document cover sheets and face monitors away from doors and windows to eliminate potential viewing by unauthorized personnel.
  • Properly label disc media and have proper classification markings, such as a DOD Form 2056 (telephone monitoring notification decal) on communications equipment, such as computers, monitors and phones.
  • Never bring portable or wireless electronic devices within three meters of a classified system.
  • Ensure common access cards and SIPRNET tokens are not left unattended.
  • If you suspect a threat to your system, disconnect it from the network immediately. Contact your dedicated security manager, cybersecurity manager or information management staff directly. Don’t shut down or reboot your computer and never attempt to investigate the cause of suspicious activity yourself.

For more information or assistance on keeping areas inspection ready, contact your unit’s security manager or your unit technical support information mission officer or information assurance training officer.