Back to Top Skip to main content

Cyber fitness, awareness key during ‘season of shopping’

Making cyber security a priority while shopping or browsing online can help you protect yourself from more than you bargained for during this ‘season of shopping.’ Making cyber security a priority while shopping or browsing online can help you protect yourself from more than you bargained for during this ‘season of shopping.’

Recommended Content:

Technology | Secure Messaging

With the holidays upon us and the season of sales and shopping nearing its height, the risk has increased for online scams and fraudulent activity targeting consumers. You can make a big difference in protecting your personal and financial information by making cybersecurity a priority.

“Everyone should be aware of scams or frauds targeting email users and shoppers,” said Servio Medina, a Branch Chief in the Cyber Security Division at the Defense Health Agency. These attempts to access your information can look like offers for Black Friday, Cyber Monday, or holiday discounts, he advised, and often seem too good to be true.

Medina warned that criminal hackers can easily spoof an email address to make it look like an offering from a trusted retailer or institution, such as a bank. “Now everything is click, click, click – but we should stop and think about what we’re clicking on before we engage, and what better time than shopping season?” he said.

Justin Hodges, chief of DHA Cyber Operations Center and director of Cybersecurity Service Provider for Space & Naval Warfare Systems, said cybercriminals may also create websites to look like they represent a charity in order to collect financial information. While some fraudulent websites can be easily identifiable, such as through a .net domain or unfamiliar email address, some more advanced websites may not be as easy to spot, he warned.

“You need to be really careful that the websites you’re going to are in fact legitimate websites,” said Hodges, who recommends browsing through a domain with “https,” which often shows a lock symbol. The “s” in the domain indicates that a website encrypts information to transit it over the internet. He also encourages consumers to research the website or company name in a search engine to see if any reviews come up.

“Scams will very often have little to no reviews on the internet, which should be a red flag,” said Hodges. By visiting a fraudulent website, shoppers run the risk of accidentally giving hackers access to their financial or other personal information, and access to computers and home files, he said.

“You don’t need to click on anything or download anything for hackers to exploit the way your browser is configured and download malicious software that gives them access to your home PC,” said Hodges. “Once financial or personal information is taken, it can be stored in data bases on the dark web and sold, making you more susceptible to security breaches in the future.”

Medina said shoppers can take some actions to help avoid a phishing attack, such as opening emails in plain text rather than html, or hovering the cursor over a hyperlink without clicking on it to check if the URL leads to a legitimate source. Additional protective steps include updating security software, using a password-protected network, and avoiding unverified public Wi-Fi when making transactions online, he said.

“A lot of people think home networks are safe compared to browsing the web while using a mobile hot spot or free Wi-Fi, but if you don’t take steps to protect your network at home, you may not be any safer at home,” said Hodges.

The Department of Homeland Security’s cyber awareness campaign, STOP.THINK.CONNECT., provides additional online safety tips, such as watching out for deals that look too good to be true, shopping through trusted retailers, and using a credit card instead of a debit card.

The National Credit Union Administration Fraud Prevention Center educates consumers on how to recognize common scams, including package delivery and gift card scams, phishing emails, charity scams, and fraudulent ads. It also offers information on the “evil twin” Wi-Fi scam, which involves a scammer putting out a Wi-Fi signal that looks just like a complimentary one available at coffee shops, airports, and hotels.

“Cyber health is important to the safety and well-being of our warfighters and their families,” said Hodges. “The more people know about cyber health, the better they can protect themselves.”

You also may be interested in...

DHA IPM 18-015: Cybersecurity Program Management

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) through (c), and in accordance with the requirements of References (d) through (y): • Establishes the Defense Health Agency’s (DHA) procedures to implement and maintain a DHA Cybersecurity Program for the Military Health System (MHS) to protect and defend DHA information and Information Technology (IT). • Is effective immediately; it will be converted into DHA-Procedural Instruction (DHA-PI), “Cybersecurity Program Management.” This DHA-IPM will expire effective 12 months from the date of issue.

  • Identification #: 18-015
  • Date: 9/23/2019
  • Type: DHA Interim Procedures Memorandum
  • Topics: Technology

DHA IPM 18-013: Risk Management Framework (RMF)

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) through (c), and in accordance with the guidance of References (d) through (ac): • Incorporates cybersecurity strategy, policy, awareness/training, assessment, continuous monitoring, authorization, implementation, and remediation. • Aligns with the Deputy Assistant Director, Information Operations (DAD IO) J-6/Chief Information Officer’s (CIO) key concept of increasing cybersecurity of Defense Health Agency’s (DHA) Information Technology (IT); therefore, robust risk assessment and management is required. • Encompasses lifecycle risk management to determine and manage the residual cybersecurity risk. • This DHA-IPM is effective immediately; it will be converted into a DHA-Procedural Instruction. This DHA-IPM will expire effective 12 months from the date of issue.

  • Identification #: 18-013
  • Date: 9/20/2019
  • Type: DHA Interim Procedures Memorandum
  • Topics: Technology

DHA IPM 18-011: Video Network Center (VNC) Endpoint Standards

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) through (c), and in accordance with the guidance of References (d) through (g): - Provides guidance for video network endpoint standards required for sites to connect to the Defense Health Agency (DHA) VNC network. These standards will help ensure security compliance, efficiency, and best practices are maintained across the DHA network. Meeting certification requirements brings many benefits, including: increased assurances of a successful video teleconference (VTC) experience, full access to bridge and point-to-point calls, and access to peer video networks, including the Department of Veterans Affairs, academia, and industry partners. Compliance with stated standards does not preclude users connecting to other DoD approved networks. - This DHA-IPM is effective immediately; it will be converted into a DHA-Procedural Instruction. This DHA-IPM will expire effective 12 months from the date of issue.

  • Identification #: 18-011
  • Date: 9/20/2019
  • Type: DHA Interim Procedures Memorandum
  • Topics: Technology

DHA IPM 18-007: Service Delivery Management Program

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) and (b), and in accordance with the guidance of References (c) through (e): - Establishes the Defense Health Agency’s (DHA) procedures for implementing and managing high quality information technology (IT) services by the Chief Information Officer (CIO), Deputy Assistant Director Information Operations (DAD IO/J-6), Military Health System (MHS). The DHA Service Delivery Management program provides customers requesting IT services from the DAD IO/J-6 or Defense Information Systems Agency service catalogs with an on-demand, automated system that provides a single-entry point to submit service requests. The automated system enables DAD IO/J-6 to align business needs and use repeatable and scalable processes to holistically track, manage, and report on customer submitted requests for IT services from submission to fulfillment. - Is binding on DoD Components and supports the Director’s, DHA, responsibility to develop appropriate management models to maximize efficiencies in the activities carried out by the DHA. - This DHA-IPM is effective immediately; it will be converted into a DHA-Procedural Instruction (DHA-PI). This DHA-IPM will expire effective 12 months from the date of issue.

  • Identification #: 18-007
  • Date: 8/7/2019
  • Type: DHA Interim Procedures Memorandum
  • Topics: Technology

DHA PI 3201.05: Technology Transfer (T2) Program

Policy

This Defense Health Agency-Procedural Instruction (DHA-PI) based on the authority of References (a) and (b), and in accordance with the guidance of References (c) through (t), establishes responsibilities, procedures, and guidance for the Defense Health Agency’s (DHA) T2 program.

  • Identification #: 3201.05
  • Date: 6/20/2019
  • Type: DHA Procedural Instruction
  • Topics: Technology

DHA IPM 18-018: Physical Custody and Control of the DoD Health Record

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) and (b), and in accordance with the guidance of References (c) through (p): • Establishes the Defense Health Agency’s (DHA) procedures for the physical custody and control of DoD Health Records at all DoD Military Treatment Facilities (MTFs) and the management, monitoring, review, and evaluation of DoD Health Record availability at MTFs. • This DHA-IPM is effective immediately and will expire effective 12 months from the date of issue. It must be incorporated into the forthcoming DHA-Procedural Instruction, “Health Records Management”.

DHA IPM 18-017: Military Health System (MHS) Information Technology (IT) Investment Management Framework

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) through (c), and in accordance with the guidance of References (d) through (v), establishes Defense Health Agency’s (DHA) procedures to: • Establish the overarching guidance to implement policies and procedures for managing DHA Deputy Assistant Director, Information Operations (DAD IO)/J-6 Defense Health Program (DHP) IT resources. The DHA Investment Management Framework is used as an enabler for MHS leadership to make informed transparent financial decisions associated with the DHA DAD IO/J-6 systems, services, and capabilities and will continue to be used in the foreseeable future. • Provide full and total awareness of all IT across the enterprise ensuring all MHS healthcare-related IT investments are accounted for and integrated both operationally and financially. This includes all IT systems, applications, and devices and all their funding identified to manage a coherent and integrated healthcare capability across the enterprise. • Provide and supersede guidance and instructions previously provided through the Services. As Military Medical Treatment Facilities (MTFs) transition to DHA management and responsibility, procedures in this DHA-IPM will supersede IT systems guidance and instructions previously provided through the Services; including IT systems in all MTFs, clinics, and enterprise services provided to Other Lines-of-Business (OLB), such as training and research, etc. In addition, it supports a coherent and comprehensive catalog of IT capability investments encompassing all IT used to support the MHS mission. • Require that all funding sources, type and Budget Activity Group (BAG), purchasing or supporting any IT must be identified for inclusion in the DHA portfolio of IT capability investments. • Provide superseding guidance and instruction, through this DHA-IPM until a DHA-Procedural Instruction is issued previously provided by the Services in References (w) through (ad), for the MTFs as they are transitioned to DHA management and responsibility. • This DHA-IPM is effective immediately and it will be converted into a DHA-Procedural Instruction. This DHA-IPM will expire effective 12 months from the date of issue.

  • Identification #: 18-017
  • Date: 11/6/2018
  • Type: DHA Interim Procedures Memorandum
  • Topics: Technology

DHA IPM 18-016: DHA IPM 18 016 Medical Coding of the DoD Health Records

Policy

This Defense Health Agency-Interim Procedures Memorandum (DHA-IPM), based on the authority of References (a) and (b), and in accordance with the guidance of References (c) through (s): • Establishes the Defense Health Agency’s (DHA) procedures for centralized oversight, standardized operations, and ensured quality and performance for the coding of DoD Health Records. • This DHA-IPM is effective immediately; it will be converted into a DHA-Procedural Instruction. This DHA-IPM will expire 12 months from the date of issue.

DHA PI 8140.01: Acceptable Use of Defense Health Agency Information Technology (IT) (Updated)

Policy

This Defense Health Agency-Procedural Instruction (DHA-PI), based on the authority of References (a) and (b), and in accordance with the guidance of References (c) through (m), establishes the Defense Health Agency’s (DHA) procedures for acceptable use of DHA IT by authorized and privileged users.

  • Identification #: DHA PI 8140.01
  • Date: 10/16/2018
  • Type: DHA Procedural Instruction
  • Topics: Technology

Waiver of Restrictive Licensure and Privileging Procedures to Facilitate the Expansion of Telemedicine Services in the Military Health System 12-010

Policy

In order to facilitate the expansion of telemedicine services in the Military Health System, this memorandum waives selective provisions of Department of Defense 602S.13-R, "Clinical Quality Assurance in the Military Health System," June 11 , 2004. This waiver is conditioned on the specific provisions of this memorandum, and shall remain in effect, unless modified or revoked, until the cancellation and reissuance of DoD 602S.13-R, or the issuance of a Department of Defense Instruction for or including telemedicine.

MHS Enterprise Architecture Signed Memo and Guide 20120730

Policy

Announcement of the release of the Military Health System (MHS) Enterprise Architecture (EA) Guide. The guide supports the MHS CIO’s responsibilities for development and maintenance of EA, which complies with the Department of Defense’s responsibilities under the Clinger-Cohen Act of 1996, Public Law 104-106.

  • Identification #: 00-memo-2012-07-30
  • Date: 7/30/2012
  • Type: Memorandums
  • Topics: Technology

Guidance on the Establishment of a Human Cell, Tissue, and Cellular and Tissue Based Products Program

Policy

This memorandum requests the Services resource a Human Cell, Tissue, and Cellular and Tissue Based Products (HCT/Ps) Program that complies with regulatory standards for management and oversight of HCT/Ps, according to the best fit for their Service.

Standard Enterprise Architecture Requirements for Acquiring Information Management/Information Technology Products and Services

Policy

The Military Health System (MHS) Information Management/Information Technology (IM/IT) Strategic Plan established enterprise-wide interoperability and common architecture goals for MHS 1M/IT products and services that promote agility and interoperability within MHS and externally with Federal and industry partners.

  • Identification #: 00-memo-2012-06-19
  • Date: 6/19/2012
  • Type: Memorandums
  • Topics: Technology

MHS Cloud First Adoption Directive and Policy Guidance Signed Memo and Attachment

Policy

The National Defense Authorization Act for Fiscal Year (FY) 2012 mandates that the Department of Defense (DoD) and its agencies develop a strategy to migrate to using Cloud computing services. Against this backdrop, DoD released an IT Enterprise Strategy and Roadmap plan in September 2011 developed by the DoD CIO, Teri Takai. This memorandum is consistent with Federal and DoD strategies, directives, and plans as they relate to implementation of a Military Health System (MHS) Cloud First policy aligning with the MHS mission

  • Identification #: 00-memo-2012-05-22
  • Date: 5/22/2012
  • Type: Memorandums
  • Topics: Technology
Showing results 1 - 14 Page 1 of 1

DHA Address: 7700 Arlington Boulevard | Suite 5101 | Falls Church, VA | 22042-5101

Some documents are presented in Portable Document Format (PDF). A PDF reader is required for viewing. Download a PDF Reader or learn more about PDFs.