Tap your fingertips, beware of these behaviors

  With the development of information technology, mobile phone networks have brought convenience to the work, study and life of officers and soldiers, but there are also hidden dangers of security and confidentiality.

Scanning codes to receive small gifts, "bargaining" free products, "crushing the Internet" can save data... Behind these behaviors, there may be hidden crises.

If officers and soldiers do not pay attention to strengthening the awareness of secrecy, they may be greedy for convenience or petty gains, which may cause leakage of secrecy.

Regarding new situations and issues regarding security and secrecy, all units must strengthen education in accordance with laws and regulations, guide officers and soldiers to learn about the Internet scientifically, use the Internet correctly, and use the Internet in accordance with regulations, stay alert at all times, and tighten the string of security and secrecy.

  Phenomenon 1

"Sweep" there will be hidden dangers of leaks

  ■Zhang Gaozhen Yuan Zijie

  "Today, after scanning the QR code to add a small program in a shopping mall, I received a backpack for free!" Not long ago, the corporal clerk of the First Squadron of Naval Aviation of the Eastern Theater Command returned from a trip and happily told his comrades about the day's experience.

  "There are hidden dangers in scanning the code at will, and you need to be cautious when using the network safely." Chen Peng, a staff member of the Force Management Section, who was inspecting the squadron, immediately reminded Xiao Gu to delete the small programs and official accounts that he had added and followed after learning about the situation.

  At first, Xiao Gu didn't take it seriously, thinking that he just scanned the code and didn't leak the secret, so it would not cause any impact.

Counselor Chen explained to him patiently the common sense of network security and confidentiality. Xiao Gu carefully recalled the scan code and found that there was a link that agreed to authorize the acquisition of personal information.

"Once the personal information in the mobile phone is leaked, it may become the target of criminals."

  The online world is exciting, but "tapping at your fingertips" can sometimes bring serious consequences.

Counselor Chen told the officers and soldiers that in recent years, "code scanning traps" have become one of the popular scams. Activities such as prize gathering and QR code gifting have become new tricks for some businesses to promote and promote. Criminals may use these methods to commit online fraud and sell individuals. Information, implanting Trojan horse viruses, etc.

If officers and soldiers lack judgment and cannot help being tempted to scan codes at will, they may fall into a trap, causing personal information to be stolen and used, and causing leakage of secrets.

  Taking the opportunity of studying typical cases, the brigade immediately carried out network security information cleaning and rectification, organized self-inspection and self-correction at all levels, immediately deleted or canceled attention to official accounts, mini programs, or application software with hidden risks, and at the same time checked the rectification situation .

Organize officers and soldiers at all levels to review relevant laws and regulations on preventing network leaks, analyze in-depth typical cases that have occurred in recent years, guide officers and soldiers to further strengthen their awareness of network security and confidentiality, recognize potential risks, actual hazards and serious consequences of the network, and strictly abide by relevant security Confidentiality regulations.

  "Want to know which friends you have deleted? Quickly scan the QR code..." Not long ago, a friend sent a popular "fan cleaning" software to a certain company fighter Xiao Jiang, and told him that he could just forward and follow him. Obtain trial qualifications.

Xiao Jiang not only declined politely, but also reminded friends to unfollow.

He said: "We must not only strengthen our own awareness of confidentiality, but also remind our comrades in arms, family and friends to be cautious and stay away from network traps." After education and rectification, the brigade officers and soldiers have significantly enhanced their awareness of confidentiality.

  Phenomenon 2

"Chop a slash" beware of trap crisis

  ■ Liu Yao

  "'Cut a slash' hides the risk of leaking secrets, don't make a big loss for the advantage." At the end of February, in the law education class of the Shangluo detachment of the Armed Police, Li Haibin, director of the political work department of the detachment, used the people around him to explain to everyone about online shopping. The hidden dangers of "bargaining" the risk of leaks, to teach officers and soldiers about network security and confidentiality.

  Some time ago, a soldier in the detachment saw his classmates show off the treadmill he got through "bargaining" in his circle of friends, and his eyes became enthusiastic.

After he chose the product he wanted, he sent the "bargain" link to the circle of friends, and asked his comrades to help him bargain. This move made some officers and soldiers quite moved.

  After discovering the situation, He Chi, the instructor of the squadron, immediately stopped such behavior and criticized and educates the officers and soldiers involved in bargaining.

The leader of the detachment expressed recognition of the practice of Instructor He. Everyone felt that the “Internet bargaining” behavior may reveal confidential content such as the location of the station, the establishment of the army, and the personal information of the officers and soldiers. There is a risk of security and confidentiality. The officers and soldiers must be guided to fully understand the hazards. Stifle hidden dangers at the root of their thoughts.

  The squadrons organized the squadrons to discuss and analyze the theme of "What is the harm of'Internet bargaining'", and carry out special rectification activities for security and confidentiality.

The officers and soldiers learned about the marketing ideas and big data principles behind the "cut one cut" through education and study, and improved their ideological understanding by popularizing scientific knowledge and analyzing typical cases.

  Combining education discussions, the detachment produced security and confidentiality education posters, showing possible traps and crises in mobile phone applications with both pictures and texts, and educates and guides officers and soldiers to protect military-related information and personal privacy in the era of big data.

In the detachment network forum, officers and soldiers discussed network security, deepened their understanding, strengthened their awareness of security precautions, and established the concept of network security in the era of big data.

  "Anyway'cutting' may harm personal interests, and may even affect the security and stability of the army." In the online forum, officers and soldiers have shared their experience.

Everyone has a deeper understanding of network security, and the awareness of confidentiality has been effectively strengthened.

  Phenomenon 3

"Lian Yi Lian" Hidden Security Risks

  ■Li Jiapeng Han Qiang Zhang Biao

  Not long ago, a regiment of the Xinjiang Military Region carried out cyber security education to guide officers and soldiers to cultivate the awareness of using the Internet scientifically and safely.

During the event, when the officers and soldiers of the service support battalion discussed the topic of "free Wi-Fi should be connected carefully", Corporal Xiao Xu recounted his own experience.

  Last year, Xiao Xu was transiting somewhere on his way back from vacation, and accidentally found that his mobile phone showed that there was free WiFi available for connection.

It was the end of the month. Seeing that the mobile phone traffic was running out, Xiao Xu clicked on free WiFi, entered the mobile phone number and verification code, and successfully connected.

"The free Wi-Fi connection is convenient and fast, and you don't have to worry about consuming your own data." Xiao Xu said in his heart.

  But soon, Xiao Xu saw a case report of online banking lost money after connecting to free WiFi, and he quickly turned off the WiFi automatic connection function in his phone.

Consulting professionals learned that after arbitrarily connecting to WiFi, mobile phones may be implanted with Trojan horse viruses, personal information may be stolen by people with ulterior motives, and information in networked electronic devices may also be leaked... Recognize the potential harm, think of yourself Xiao Xu couldn't help but feel tight on his military status.

He used anti-virus software to conduct a full-scale physical examination on his mobile phone and promptly stopped the “crushing network” behavior.

  At the discussion site, some officers and soldiers who had connected to free WiFi in the past expressed that they were well educated.

The regiment continues to strengthen education and guidance, adopting a combination of dredging and blocking methods to conduct standardized checks on the use of mobile phones by officers and soldiers to eliminate hidden risks.

The team invited network experts to give lectures, organized officers and soldiers to watch warning education films, and strengthened the awareness of safe use of the Internet.

They also coordinated resident telecom operators to handle network packages for officers and soldiers, add signal amplifiers, and "incrementally speed up" the use of networks for officers and soldiers.

  Recently, the regiment organized a test on the theory of safety nets, and Xiao Xu achieved excellent results.

He said that only by building a firm awareness of safe use of the Internet can we truly enjoy the convenience of the Internet.