Protecting the Mission, One Password at a Time

  • Published
  • By Airman Sarah Post
  • 90 Missile Wing Public Affairs

Technology, computers and the internet are all a large part of the modern world and the everyday lives of military personnel. The more technology advances, the more need the Air Force has for its personnel to practice better cybersecurity.

“Cybersecurity is the practice of being aware of your surroundings on an internet domain,” said 2nd Lt. Ryan Moon, wing cybersecurity manager, 90th Communications Squadron.

There are levels to cybersecurity, according to Moon. The first layer is the gate to get on base, where you need a proper ID. Then, there are locked buildings requiring a code or a key. The third layer of security is the computer that needs a Common Access Card for any log in, and a fourth layer is the pin a CAC is linked to. These layers continue on once a computer is logged on to, with pins and codes that are needed to work in order to access information. 

Cyber security is important for keeping sensitive information safe and in the right hands. By being aware and thorough in every day practices, all personnel can help protect the 90th Missile Wing’s mission and its Airmen. 

There are many ways to practice good cyber security, according to wing cybersecurity experts.

“A lot of issues we see would be resolved if people would just start treating their CAC the same way they would protect their credit card or car key,” said Tech. Sgt. Megan Stark, wing cybersecurity manager, 90 CS.

Protecting a CAC consists of taking it out of the computer each time the user steps away, by not handing it to anyone and by not writing down its PIN and leaving it. More ways to practice good cybersecurity include not writing down any passwords, completing cyber awareness annual training, creating strong passwords, only opening emails and links you are expecting and being aware of insider threats. 

The 90th Missile Wing wants to be proactive in its cybersecurity, and stress that the best ways to be proactive and prevent any cybersecurity problems are by making the above practices a part of an everyday routine.