Search
  • projects9372

Definition of Cybersecurity

Measures take to protect a computer or computer system, (as on the Internet), against unauthorized access or attack.

Merriam-Webster






Own Your Role in Cybersecurity:

Start With the Basics


Cyber Security Basics


  • MAKE A LONG, UNIQUE PASSPHRASE

Length trumps complexity. A strong passphrase is a

sentence that is at least 12 characters long. Focus

on positive sentences or phrases that you like to

think about and are easy to remember.


  • PASSPHRASES AREN'T ENOUGH

Use 2-factor authentication or multi-factor

authentication (like biometrics, security keys or a

unique, one-time code through an app on your

mobile device) whenever offered.


  • WHEN IN DOUBT, THROW IT OUT

Links in email, tweets, texts, posts, social media

messages and online advertising are the easiest

way for cyber criminals to get your sensitive

information. Be wary of clicking on links or

downloading anything that comes from a stranger or

that you were not expecting. Essentially, just don’t

trust links.


  • KEEP A CLEAN MACHINE

Keep all software on internet connected devices – including

personal computers, smartphones and tablets – current to

reduce risk of infection from ransomware and malware. Configure

your devices to automatically update or to notify you when an update

is available.


  • BACK IT UP

Protect your valuable work, music, photos and other digital information by

making an electronic copy and storing it safely. If you have a copy of your

data and your device falls victim to ransomware or other cyber threats, you will

be able to restore the data from a backup. Use the 3-2-1 rule as a guide to

backing up your data. The rule is: keep at least three (3) copies of your data,

and store two (2) backup copies on different storage media, with one (1) of them

located offsite.


  • OWN YOUR ONLINE PRESENCE

Every time you sign up for a new account, download a new app, or get a new device, immediately configure the privacy and security settings to your comfort level for

information sharing. Regularly check these settings (at least once a year) to make

sure they are still configured to your comfort.


  • SHARE WITH CARE

Think before posting about yourself and others online. Consider what a post reveals, who might see it and how it might affect you or others. Consider creating an alternate persona that you use for online profiles to limit how much of your own personal information you share.


  • GET SAVVY ABOUT WIFI HOTSPOTS

Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection.


Additional Resources


Cybersecurity & Infrastructure Security Agency: Cybersecurity Tips

https://www.us-cert.gov/ncas/tips

Cybersecurity & Infrastructure Security Agency: Cybersecurity Tips

https://www.us-cert.gov/ncas/tips

Cybersecurity & Infrastructure Security Agency: Protecting Your Privacy

https://www.us-cert.gov/ncas/tips/ST04-013

Federal Trade Commission: Cybersecurity Basics

https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity/basics

Adobe & NCSA Security Awareness Video: Phishing and Ransomware

https://youtu.be/D_yAYhjNE-0

20 views0 comments