Postal Bulletin: Protecting USPS Networks

When plugging a smart mobile device (e.g., phone, tablet, or wearable technology) into a computer’s USB port, the two devices can exchange information or malware.1 At the United States Postal Service®, this could put sensitive information into the wrong hands and potentially affect our business and reputation. To prevent a security breach, follow these important…

 Continue reading

USPS to modify ACE users’ internet access

The Postal Service is modifying internet access for ACE computer users to help protect the organization from cyberthreats such as malware and phishing links. Starting this month, internet access will be approved based on a multilevel structure for all USPS-issued desktops, laptops and tablets, as well as smartphones (when the phones connect to the postal…

 Continue reading

USPS: Charging smartly – Safety tips for personal devices

The Postal Service is reminding employees that plugging smartphones, unapproved thumb drives, e-cigarettes and other personal devices into USPS computers violates the organization’s security policies. Plugging unauthorized devices into postal equipment runs the risk of inadvertently transferring malicious software, which could disable computers and allow hackers to gain access to the organization’s network. To protect…

 Continue reading

Postal Bulletin highlights protecting USPS Networks from personal devices

When plugging a smart mobile device (e.g., phone, tablet, or wearable technology) into a computer’s USB port, the two devices can exchange information or malware. At the U.S. Postal Service®, this could put sensitive information into the wrong hands and potentially affect our business and reputation. To prevent a security breach, follow these important charging…

 Continue reading

USPS: Beware of Ransomware

Cybercriminals are turning to a new form of malware in large numbers. Ransomware, like the name suggests, is a new form of “cyber extortion” wherein the data on an infected computer or network is encrypted and inaccessible to the user unless a ransom is paid to the hacker. Any and all data, files, folders, or…

 Continue reading