Cybersecurity Awareness Month Champion | See Yourself in Cyber | Contrast Security (2022)

Cybersecurity Awareness Month Champion | See Yourself in Cyber | Contrast Security (2)

Another year has passed, and once again Contrast is proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in promoting global awareness of online safety and privacy. Co-led by the National Cyber Security Alliance and the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security, this annual campaign is a global effort between businesses, government agencies, colleges and universities, associations, nonprofit organizations, and individuals and is designed to raise awareness and help everyone stay safe online.

Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline attack, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

With this onslaught of negative news, it can be easy for individuals to become overwhelmed and to feel powerless in the face of what can feel like insurmountable threats posed by cybersecurity. But in actuality, nothing could be further from the truth.

Why security matters more than ever right now

Even security professionals can become complacent when it comes to practicing good online hygiene and maintaining security best practices every day. It is important to remember why these sorts of standards matter when it comes to protecting both yourself and your place of work from exploitation.

(Video) Cyber Security Awareness Month 2022: See Yourself in Cyber

With all of the jargon that is typically thrown around in relation to cybersecurity, there is a long-standing misperception that cybersecurity is beyond everyday people and that it should be left to the professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to live with them. But this just isn’t true. In fact, everyone has a huge role to play in cybersecurity threat prevention, detection and remediation, regardless of their level of technical expertise. Any and all technology users are very much the first line of defense when it comes to thwarting cybercrime. Unfortunately, many individuals aren’t familiar with some of the best practices for boosting cybersecurity and how easy they are to use.

Reviewing the cyber basics

Luckily, there are several steps that we all can take on a daily basis to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:

Enable multifactor authentication (MFA)

As of 2020, more than 99.9% of Microsoft enterprise accounts that get invaded by attackers didn’t use MFA. MFA adds a necessary second check to verify your identity when logging into one of your accounts. By requiring multiple methods of authentication, your account is further protected from being compromised, even if a malicious actor hijacks your password. In this way, MFAs make it more difficult for password-cracking tools to enable attackers to break into accounts. If MFA is available, enable it! Having it is always better than not.

Now, you might be wondering about the recent breaches in 2022 involving Uber, Okta, Twilio and others, in which malicious actors took advantage of users and bypassed MFA requirements to compromise accounts. This is a rare exception, and MFA is still a critical component of providing another layer of authentication and identification protections on your accounts.

Use strong passwords

This may seem obvious, but all too often, securing strong passphrases/password managers are overlooked. But the reality is that 62% of data breaches used compromised credentials, according to the DBIR. Using long, complex and unique passwords for all of your accounts is a good way to stop your account from being hacked, and an easy way of keeping track and remembering your passwords is by using a password manager. The National Institute of Standards and Technology (NIST) provides great guidance in setting password standards.

Recognize and report phishing

Phishing is one of the most common forms of social engineering attacks, and over 60% of reported data breaches in the last year using social engineering started with phishing. Phishing — when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links — remains one of the most popular tactics among cybercriminals today. While phishing has gotten more sophisticated, you should still keep an eye out for typos, poor graphics, out-of-character messages, unexpected messages and other suspicious characteristics, as these can be telltale signs that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt, be sure to report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

One of the more common avenues of phishing these days is through the use of SMS, also called smishing. Some common smishing attacks send SMS messages to unsuspecting users, purportedly coming from businesses such as shipping companies, phone providers, Amazon, etc. These text messages contain links that aim to steal credentials or install malware on the mobile devices. The best approach to thwarting these attacks is to copy the offending message and send it to 7726 (SPAM), and your provider can take it from there. You may also want to block any further communication from the number if your mobile device provides that functionality.

Update your software

When a device prompts that it is time to update the software, it may be tempting to simply click postpone and ignore the message. However, having the latest security software, web browser and operating system on devices is one of the best defenses against online threats. So, don’t wait —update. Malicious actors take advantage of disclosed vulnerabilities due to the lag time between initial reporting and patching across all affected systems. The faster we can keep our software up to date, the more protected we will be in the long run.

And for software vendors in particular, shortening Mean Time to Respond/Remediate (MTTR) for application vulnerabilities can help customers to reduce their windows of exposure. Application vulnerabilities simply need to be found and fixed faster. For one major application security vendor, the average MTTR is currently 171 days. To remediate vulnerabilities faster, software vendors need to focus on vulnerabilities that matter — and ignore those that don’t. Recent research shows that a majority of vulnerabilities — including 54% of those rated “Critical” and 49% rated “Major” — would be classified as false positives with traditional tools.

Trust your gut

Common sense is a crucial part of maintaining good online and security hygiene, and an intuitive step to stay safe online is to do some research before downloading anything new to your device — both web-based applications as well as mobile apps. Before downloading any new learning application on your device, make sure that it’s safe by checking who created the application, what the user reviews say, and if there are any articles published online about the application’s privacy and security features. I also recommend that people listen to their gut when interacting with the web. Our human intuition and ability to question the legitimacy of things can help to keep us safe online from things like malicious websites or phishing schemes. If it feels wrong, if it seems too good to be true, if you receive a download link from someone out of band, question it and do your homework.

‘See yourself in cyber’

It’s more than just a catchy theme for this year’s Cybersecurity Awareness Month campaign. Everyone has a responsibility to do their part in securing our interconnected world. This year, instead of doing weekly themes as in the past, Cyber Security Awareness Month is focused on four specific things: enabling MFA, using strong passwords, recognizing and reporting phishing, and updating your software. These four themes should resonate with every single individual and organization alike and provide the basics they need to attain good security hygiene. Own your role in cybersecurity by starting with these basics.

For more information about Cybersecurity Awareness Month 2022 and how to participate in a wide variety of activities, visit staysafeonline.org/cybersecurity-awareness-month/. You can also follow and use the official hashtag #BeCyberSmart on social media throughout the month.

Cybersecurity Awareness Month Champion | See Yourself in Cyber | Contrast Security (3)

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.

(Video) Be cyber-smart this October for Cybersecurity Awareness Month
(Video) Cybersecurity Awareness Month 2022- "See Yourself In Cyber" EXPLAINED!

Subscribe to the Contrast Blog

By subscribing to our blog you will stay on top of all the latest appsec news and devops best practices. You will also be informed of the latest Contrast product news and exciting application security events.

Another year has passed, and once again Contrast is proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in promoting global awareness of online safety and privacy. Co-led by the National Cyber Security Alliance and the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security, this annual campaign is a global effort between businesses, government agencies, colleges and universities, associations, nonprofit organizations, and individuals and is designed to raise awareness and help everyone stay safe online.

Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline attack, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

With this onslaught of negative news, it can be easy for individuals to become overwhelmed and to feel powerless in the face of what can feel like insurmountable threats posed by cybersecurity. But in actuality, nothing could be further from the truth.

Why security matters more than ever right now

Even security professionals can become complacent when it comes to practicing good online hygiene and maintaining security best practices every day. It is important to remember why these sorts of standards matter when it comes to protecting both yourself and your place of work from exploitation.

With all of the jargon that is typically thrown around in relation to cybersecurity, there is a long-standing misperception that cybersecurity is beyond everyday people and that it should be left to the professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to live with them. But this just isn’t true. In fact, everyone has a huge role to play in cybersecurity threat prevention, detection and remediation, regardless of their level of technical expertise. Any and all technology users are very much the first line of defense when it comes to thwarting cybercrime. Unfortunately, many individuals aren’t familiar with some of the best practices for boosting cybersecurity and how easy they are to use.

Reviewing the cyber basics

Luckily, there are several steps that we all can take on a daily basis to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:

Enable multifactor authentication (MFA)

As of 2020, more than 99.9% of Microsoft enterprise accounts that get invaded by attackers didn’t use MFA. MFA adds a necessary second check to verify your identity when logging into one of your accounts. By requiring multiple methods of authentication, your account is further protected from being compromised, even if a malicious actor hijacks your password. In this way, MFAs make it more difficult for password-cracking tools to enable attackers to break into accounts. If MFA is available, enable it! Having it is always better than not.

Now, you might be wondering about the recent breaches in 2022 involving Uber, Okta, Twilio and others, in which malicious actors took advantage of users and bypassed MFA requirements to compromise accounts. This is a rare exception, and MFA is still a critical component of providing another layer of authentication and identification protections on your accounts.

Use strong passwords

This may seem obvious, but all too often, securing strong passphrases/password managers are overlooked. But the reality is that 62% of data breaches used compromised credentials, according to the DBIR. Using long, complex and unique passwords for all of your accounts is a good way to stop your account from being hacked, and an easy way of keeping track and remembering your passwords is by using a password manager. The National Institute of Standards and Technology (NIST) provides great guidance in setting password standards.

Recognize and report phishing

Phishing is one of the most common forms of social engineering attacks, and over 60% of reported data breaches in the last year using social engineering started with phishing. Phishing — when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links — remains one of the most popular tactics among cybercriminals today. While phishing has gotten more sophisticated, you should still keep an eye out for typos, poor graphics, out-of-character messages, unexpected messages and other suspicious characteristics, as these can be telltale signs that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt, be sure to report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

One of the more common avenues of phishing these days is through the use of SMS, also called smishing. Some common smishing attacks send SMS messages to unsuspecting users, purportedly coming from businesses such as shipping companies, phone providers, Amazon, etc. These text messages contain links that aim to steal credentials or install malware on the mobile devices. The best approach to thwarting these attacks is to copy the offending message and send it to 7726 (SPAM), and your provider can take it from there. You may also want to block any further communication from the number if your mobile device provides that functionality.

Update your software

When a device prompts that it is time to update the software, it may be tempting to simply click postpone and ignore the message. However, having the latest security software, web browser and operating system on devices is one of the best defenses against online threats. So, don’t wait —update. Malicious actors take advantage of disclosed vulnerabilities due to the lag time between initial reporting and patching across all affected systems. The faster we can keep our software up to date, the more protected we will be in the long run.

And for software vendors in particular, shortening Mean Time to Respond/Remediate (MTTR) for application vulnerabilities can help customers to reduce their windows of exposure. Application vulnerabilities simply need to be found and fixed faster. For one major application security vendor, the average MTTR is currently 171 days. To remediate vulnerabilities faster, software vendors need to focus on vulnerabilities that matter — and ignore those that don’t. Recent research shows that a majority of vulnerabilities — including 54% of those rated “Critical” and 49% rated “Major” — would be classified as false positives with traditional tools.

Trust your gut

Common sense is a crucial part of maintaining good online and security hygiene, and an intuitive step to stay safe online is to do some research before downloading anything new to your device — both web-based applications as well as mobile apps. Before downloading any new learning application on your device, make sure that it’s safe by checking who created the application, what the user reviews say, and if there are any articles published online about the application’s privacy and security features. I also recommend that people listen to their gut when interacting with the web. Our human intuition and ability to question the legitimacy of things can help to keep us safe online from things like malicious websites or phishing schemes. If it feels wrong, if it seems too good to be true, if you receive a download link from someone out of band, question it and do your homework.

(Video) Level Up Your Cybersecurity | Cybersecurity Awareness Month Special Presentation #cybersecurity

‘See yourself in cyber’

It’s more than just a catchy theme for this year’s Cybersecurity Awareness Month campaign. Everyone has a responsibility to do their part in securing our interconnected world. This year, instead of doing weekly themes as in the past, Cyber Security Awareness Month is focused on four specific things: enabling MFA, using strong passwords, recognizing and reporting phishing, and updating your software. These four themes should resonate with every single individual and organization alike and provide the basics they need to attain good security hygiene. Own your role in cybersecurity by starting with these basics.

For more information about Cybersecurity Awareness Month 2022 and how to participate in a wide variety of activities, visit staysafeonline.org/cybersecurity-awareness-month/. You can also follow and use the official hashtag #BeCyberSmart on social media throughout the month.

FAQs

How can we promote cybersecurity awareness? ›

10 Ways to raise Cyber Security Awareness amongst your Employees
  1. Prioritize Cybersecurity in your organization. ...
  2. Get management involved. ...
  3. Promote Cyber Security best practices, supported by robust Policies and Procedures. ...
  4. Set specific rules for emails, browsing, and mobile devices.
29 Jul 2022

What should I do for cyber security Month? ›

That means enabling basic cyber hygiene practices: update your software, think before you click, have good strong passwords or a password keeper, and enable multi-factor authentication (meaning you need "More Than A Password!") on all your sensitive accounts.

What is cybersecurity awareness and why is it important? ›

When an enterprise's employees are cyber security aware, it means they understand what cyber threats are, the potential impact a cyber-attack will have on their business and the steps required to reduce risk and prevent cyber-crime infiltrating their online workspace.

Why is cyber security your passion? ›

In cyber security, you will never feel like you're doing archaic, unnecessary work. The world of cybercrime and cyber security is constantly evolving. Staying ahead of criminals is a significant part of the job. You can feel good about your work knowing that you're helping protect peoples' livelihoods and privacy.

What is Cyber Security Awareness for students? ›

Being aware of the dangers of browsing the web, checking email and interacting online are all components of cybersecurity awareness.

How can cybercrime awareness be spread? ›

Online cybercrime reporting portal has been launched to enable complainants to report complaints pertaining to Child Pornography/Child Sexual Abuse Material, rape/gang rape imageries or sexually explicit content.

What is this year's theme for Cybersecurity Awareness Month? ›

“To build a more resilient nation, everyone—from K through Gray—has a role to play, which is why our theme for this year's Cybersecurity Awareness Month is 'See Yourself in Cyber,'" said CISA Director Jen Easterly.

Which Month is cyber security Month? ›

Held every October, we celebrate National Cybersecurity Awareness Month (NCSAM) by highlighting the importance of cybersecurity. In conjunction with the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), this year's theme is See yourself in Cyber. #BeCyberSmart.

What do you do in cyber security? ›

"Top 10" List of Secure Computing Tips
  1. Tip #1 - You are a target to hackers. ...
  2. Tip #2 - Keep software up-to-date. ...
  3. Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls. ...
  4. Tip #4 - Practice good password management. ...
  5. Tip #5 - Be careful what you click. ...
  6. Tip #6 - Never leave devices unattended.

How important is cyber security awareness to our daily lives? ›

Cyber security is important because it encompasses everything that relates to protecting our data from cyber attackers who want to steal this information and use it to cause harm.

What is user awareness in cyber security? ›

User security awareness, typically a component of a company's security policy, includes educating and testing employees to help protect your business against cybercrimes, including phishing and other social-engineering attacks.

What is the main goal of information security awareness and training? ›

The main benefit of cybersecurity awareness training is protection from attacks on digital systems or a data breach. Preventing such incidents is critical because a successful cyber attack can financially cripple an organization and significantly harm its brand reputation.

How do I write a personal statement for cyber security? ›

Confidence, accountability and effective communication would take me to my professional goals. Apart from being a good employee, I wish to be a responsible cybersecurity leader. The advanced program in cybersecurity that your university offers would largely help me realize these goals.

What are the top 3 personal attributes important to a cyber professional? ›

The traits you'll need to be successful in cyber security
  • An eye for attention. ...
  • Listening ability. ...
  • A hunger to learn. ...
  • Writing and speaking. ...
  • Courtesy and professionalism. ...
  • Ethical standards. ...
  • Passion for the field.
10 Feb 2020

How do I write a statement of purpose for cyber security? ›

Statement of purpose (SOP) for Cyber Security
  1. Clearly mention when you developed a passion for your intended course Cyber Security.
  2. Present your independent research and reasons behind choosing Artificial Intelligence - Cyber Security, country and the university.
  3. Mention your academic achievements.
9 Nov 2021

Why is cyber awareness important for students? ›

Cybersecurity awareness training is important because it teaches students how they can protect themselves from cyber-attacks. Students will learn about phishing scams, malware, ransomware, and other computer threats. This is absolutely necessary for schools to keep students safe.

Why is cyber security important for students? ›

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.

Why should students learn about cyber security? ›

There are great opportunities for anyone starting a career in cybersecurity: Salaries in cyber security have a greater growth potential than 90% other industries. For senior security professionals, earnings can surpass the average median by a vast amount.

Why is it important to stop cyber crime? ›

Javelin Strategy & Research published an Identity Fraud Study in 2021 which found that identity fraud losses for the year totalled $56 billion. For both individuals and companies, the impact of cybercrime can be profound – primarily financial damage, but also loss of trust and reputational damage.

Why is it important for us to learn cybercrime Prevention Act? ›

The internet has cyber laws that were put into place for the users to stay protected. This allows internet users access, privacy, freedom of expression, and jurisdiction. Cyber Laws are important because it incorporates all the activities concerning the internet.

Can cybercrime be prevented through education? ›

The primary tool for such prevention is undoubtedly education aimed at establishing greater awareness and knowledge regarding illegal Internet content and cybercrime among children and teenagers, as well as parents and educators.

What is the most effective way to promote security awareness in your organization? ›

5 Tips to Implement Security Awareness at Your Company
  1. Make sure you have Policies and Procedures in place. ...
  2. Learn about and train employees on How to Properly Manage Sensitive Data. ...
  3. Understand Which Security Tools You Actually Need. ...
  4. Prepare your employees to Respond to a Data Breach. ...
  5. Know Your Compliance Mandates.

How do you educate employees for cyber security? ›

How to Educate Employees about Cybersecurity
  1. Communicate Potential Impact of Cybersecurity Incident. ...
  2. Improve Your Cybersecurity Messaging. ...
  3. Teach Them about Various Types of Cybersecurity Threats. ...
  4. Make Cybersecurity Training Part of Onboarding and an Ongoing Conversation.
2 Jun 2021

What aspects should be considered when promoting cyber security at a workplace? ›

When developing your cyber security policy consider the following steps.
  • Set password requirements. ...
  • Outline email security measures. ...
  • Explain how to handle sensitive data. ...
  • Set rules around handling technology. ...
  • Set standards for social media and internet access. ...
  • Prepare for an incident. ...
  • Keep your policy up-to-date.
3 Aug 2021

How can we improve cyber security in the Philippines? ›

  1. Reducing the Risks of Cyber Attacks. ...
  2. Cyber Security Best Practices in the Workplace. ...
  3. Ensure the Security of Wi-Fi or Internet Connection. ...
  4. Employing Third-party Controls. ...
  5. Install Security Software Updates. ...
  6. Investing in Effective Security Systems. ...
  7. Raise Awareness of Current Threats. ...
  8. Include All Users.

How do you develop security awareness training? ›

Creating the Security Awareness Program

Identify organizational goals, risks, and security policy. Identify stakeholders and get their support. Create a baseline of the organization's security awareness. Create project charter to establish scope for the security awareness training program.

How do you promote security culture? ›

Here are four ways to take a thoughtful, positive approach to security culture and build security maturity within your organization.
  1. Avoid complacency and optimize for success. ...
  2. Educate and encourage users. ...
  3. Reward good security behavior. ...
  4. Evaluate security tools with maturity in mind.
8 Jun 2021

Why it is important for companies to educate their staff on cyber security? ›

Training modules make sure staff members understand challenges faced by security issues and know how to deal with any problems that crop up. On a broader scale, it helps employees track security issues that surface at the roots and mitigate them before they escalate and become worse.

Why do employees need cyber security training? ›

This course teaches employees the knowledge they need to understand and avoid cyber threats through practical examples. By educating employees on security threats and how to report data breaches, employers are reducing the risk of such attacks and the crippling impact they can have on the workplace.

What are the benefits of cyber security training? ›

Benefits of Cybersecurity Training
  • Increased Security. Beginning with the obvious, cybersecurity training makes your business more secure. ...
  • Time and Money Saved. Cybersecurity training for your team is also a wise investment. ...
  • Empowering Your Workforce. ...
  • Retain Customers' Trust.

What is a cybersecurity mindset? ›

The Cybersecurity Mindset provides a layered approach to thinking holistically about cybersecurity and engineering protection standards for data, applications, information, and cloud services.

What are some of the best cyber security practices we must follow? ›

Top Cybersecurity Tips in 2022
  • Keep software up-to-date. ...
  • Avoid opening suspicious emails. ...
  • Keep hardware up-to-date. ...
  • Use a secure file-sharing solution to encrypt data. ...
  • Use anti-virus and anti-malware. ...
  • Use a VPN to privatize your connections. ...
  • Check links before you click. ...
  • Don't be lazy with your passwords!

What are security best practices? ›

10 Important Cybersecurity Best Practices
  • Education. It's much easier to prevent a hack than it is to recover from a hack. ...
  • Better Passwords and Multi-Factor Authentication. ...
  • Know Your Company. ...
  • Safe and Secure WiFi. ...
  • Backups Backups Backups. ...
  • Install Anti-Virus Software. ...
  • Secure Physical Devices. ...
  • Update Software and Firmware.
12 Jul 2021

What are the primary goals of the national cybersecurity plan 2022? ›

The primary goals of this Plan are as follows: (1) assuring the continuous operation of our nation's critical infostructures, public and military networks (2) implementing cyber resiliency measures to enhance our ability to respond to threats before, during and after attacks, (3) effective coordination with law ...

What are the five goals of information security? ›

The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

What are the goals of cybersecurity in the Philippines? ›

The primary goals of this Plan include: (1) assuring the continuous operation of our nation's critical cyber infrastructures, (2) implementing capacity-building measures to enhance our ability to respond to threats before, during and after attacks, (3) effective law enforcement and administration of justice, and (4) a ...

Videos

1. National Cyber Security Awareness Month 2022
(Cyber Security Authority Ghana)
2. How to Get Involved in Cybersecurity Awareness Month 2022
(StaySafeOnline.org)
3. Cyber Security Awareness Month 2022: How to Improve Cyber Security Awareness in Your Organization
(Check Point Software Technologies, Ltd.)
4. National Cyber Security Awareness Month 2022
(Cyber Security Authority Ghana)
5. Cybersecurity Awareness Month - Level up your cybersecurity
(Infosec)
6. Cybersecurity Awareness Month 2022 - Trailer
(Living Security)

Top Articles

Latest Posts

Article information

Author: Annamae Dooley

Last Updated: 01/08/2023

Views: 5459

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Annamae Dooley

Birthday: 2001-07-26

Address: 9687 Tambra Meadow, Bradleyhaven, TN 53219

Phone: +9316045904039

Job: Future Coordinator

Hobby: Archery, Couponing, Poi, Kite flying, Knitting, Rappelling, Baseball

Introduction: My name is Annamae Dooley, I am a witty, quaint, lovely, clever, rich, sparkling, powerful person who loves writing and wants to share my knowledge and understanding with you.