FSA
  • Home
  • Services
  • Resources
  • Contact Us
  • Registration

Fort
Sherman
​Academy

Fort Sherman Academy trains and supports individuals, churches, and sending organizations in faith-based security and risk management. We assist in the furtherance of their mission by training them to better avoid, protect, and survive potential or actual adverse events thus allowing them to reach every corner of the globe.
As groundbreaking leaders​ in personal security and risk management for travelers, we stand ready to equip and serve as you are called to the ends of the Earth.

ARE YOU PREPARED?​

Picture
 ​PERSONAL SECURITY

Faith-based guidance and practice in prevention, protection, interaction, and survival
  • Gov't & Criminal Applications
  • Low - High Risk Versions
  • 2 Hours up to 10 Days
  • Online or Live
Vertical Divider
Picture
RISK  MANAGEMENT

Collaborative workshops on assessing risks, mitigating​ crises, and managing contingencies
  • Local & Global Applications
  • 2 Days up to 4 Days
  • Develop and Utilize Manuals in Scenario-based Exercises​
Vertical Divider
Picture
​CROWNING  SHIELD

​Partner together to provide 24/7 emergency access, consultation, and threat analysis
  • Tiered Pricing Packages
  • Discounted Training
  • Personalized Instructors

NEWS FOR YOU​

Picture
IS IT TIME'S UP FOR TIKTOK?

Two cybersecurity research firms determined that the popular TikTok app can bypass user preferences, avoid code audits, and essentially access all data on mobile devices.

The summaries of the studies suggest that TikTok can bypass security/operating audits on the Apple and Google app stores. The research also found that TikTok can change the app’s behavior without users’ knowledge and access device tracking features that give the Chinese company and third parties access to full user data.

This far exceeds the access that U.S.-made apps like Facebook and Twitter have to user data. Conquest Cyber, who reviewed the studies, stated: “These dynamic properties allow TikTok carte blanche access to your device within the scope of what the application can see. The TikTok browser has the ability to query [look into] things on the device itself.”

For a FREE product that has a platform size that exceeds 1 billion active users, how do they make money? Remember, as with any social media, if you are not paying for it, then YOU are likely the product. The data you give, which almost always is more than users realize, can be hijacked. The collection, control of distribution, and manipulation of any social media make it a powerful weapon.



Check out our SENTINEL classes for further discussions, practices, and collaboration on cyber-security mitigations.



TIPS & ADVICE​

Picture
2,300 INTERNET COMPLAINTS PER DAY
 
No, that doesn’t include complaining about your download speeds. This is 847,376 complaints that were received in 2021 by the FBI’s Internet Crime Complaint Center (IC3) – recording more than $6.9 billion in losses to individual and business victims.

What were the most frequently reported complaints? Phishing and similar ploys like non-payment/non-delivery scams, and extortion. The most financially costly complaints involved business email compromise, confidence fraud, and spoofing – like mimicking the account of a person or vendor known to the victim in order to gather personal or financial information.

While email is still a common entry point, frauds are also beginning on text messages—a crime called smishing—or even fake websites—a tactic called pharming.

You may get a text message that appears to be your bank asking you to verify information on your account, or you may even search a service online and inadvertently end up on a fraudulent site that gathers your bank or credit card information.

You need to be extremely skeptical and double check everything. In the same way your bank and online accounts have started to require two-factor authentication—apply that to your life. Verify requests in person or by phone, double check web and email addresses, and don’t follow the links provided in any messages.

 




Picture
HOW CRACK-ABLE ARE YOU?

Brute-force hacking can crack an eight-character password in less than one hour, according to Hive Systems.

In a recently published research article, the security news firm says any password with less than seven characters can be brute-forced "INSTANTLY". Its findings show how more accessible and affordable cloud computing services make it simpler to crack passwords than two years ago, when the company showed that a relatively strong, eight-character password was crackable in eight hours. 

While password managers are the best bet for protecting passwords, research also showed that a 12-character password created by a password manager could take some 3,000 YEARS to brute-force crack. Check out this password table of its findings on password-character combinations and their vulnerabilities to brute-force hacks.





Upcoming Training Dates

C+     August 16 - 25, 2022     N. IDAHO - (CLOSED - REG. FULL)
B+     September 13 - 15, 2022     ONLINE INTERACTIVE
B+     November 8 - 10, 2022     ONLINE INTERACTIVE

B+     November 14 - 16, 2022     SAN DIEGO, CA

Who We Are

Fort Sherman Academy trains and supports individuals, churches, and sending organizations in faith-based security and risk management. We assist in the furtherance of their mission by training them to better avoid, protect, and survive potential or actual adverse events thus allowing them to reach every corner of the globe.

Connect With Us

Picture
901 N. Division
​Pinehurst, ID 83850
Picture
​888 211 8674
​
Picture
info@fortsherman.org
Copyright © 2022 Fort Sherman Academy. All Rights Reserved 
  • Home
  • Services
  • Resources
  • Contact Us
  • Registration