See Yourself in Cyber

Cyberattacks are a threat to national security, affecting small and large businesses and individuals. Everyone must do their part to secure their corporate data and personally identifiable information, reducing the risk of cyber attacks.  The included resources are intended for you to use to educate and to adopt cyber smart practices.  Together we can greatly increase our cybersecurity online, at work, and at home by taking a few basic steps.

PROTECT YOURSELF ONLINE

There are four easy ways to protect yourself online:
1. Enable multi-factor authentication (MFA)
2. Use strong passwords
3. Recognize and report phishing attacks
4. Update software to ensure the most current protection.

OTHER AVENUES OF ATTACK

Any device that stores information or is connected to the internet can be a way for cyber criminals to gain access to your information systems – or, in some cases, use your devices to attack someone else. Assume that you are vulnerable and take measures to understand and mitigate risk.

KNOW YOUR CYBER BASICS1
PASSWORD TIPS

HELPFUL TIPS

  • Creating strong passwords is an easy way to improve your cyber security. Strong passwords include one uppercase letter, one lowercase letter, at least one number and 11 or more characters. Be sure to use different passwords for different accounts.
  • Use password managers to generate and remember different, complex passwords for each of your accounts. A password manager will encrypt passwords securing them for you!
  • Put cybersecurity first by protecting the information stored on devices. Much of a user’s personal information is stored either on their computer, smartphone, tablet or possibly someone else’s system.

HOW TO DETECT A PHISHING EMAIL

  1. Watch for misspellings and incorrect grammar
    • An email from a legit organization should be well written
  2. Inconsistencies in email addresses, links and domain names
    • Don’t just check the name of the person sending you the email. Check their email address by hovering your mouse over the ‘from’ addresses
  3. Be careful with all attachments – and do not open questionable ones!
    • Most organizations will not send you emails with attachments, but instead direct you to download documents or files on their own website.
  4. Protect your personal information
    • Legitimate companies will never ask for sensitive or personal information over email.
RECOGNIZE AND REPORT PHISHING