Cyber Security Tip #11

Cyber Security Tip #11 5 Tips for Shopping Online Safely and Secure 1. Look for the lock! Before making a purchase online, make sure the site is secure: https:// or shttp:// in the URL Use familiar site! Start at a trusted site rather than shopping with a search engine. 2. Search results can be rigged to lead you astray, especially when you drift past the first few pages of links. 3. Don’t tell all! No online shopping store needs your social security number or your birthday to do business. 4. Don’t wait for your bill to come at the end of the month. Go online regularly during the holiday season and look at electronic statements for your credit card, debit card, and checking accounts. Make sure you don’t see any fraudulent charges, even originating from sites like PayPal 5. Think mobile! There’s no real need to be any more nervous about shopping on a mobile device than online. The trick is to use apps provided directly by the retailers, like Amazon, Target, etc. Use the apps to find what you want and then make the purchase directly. ‪#‎NCSAM‬

Cyber Security Tip #10

Five Ways to Keep Your Facebook Account Secure With social media sites like Facebook, hackers and crocks are finding it easier to not only find information about you but also using that information to bully you online. The news recently reported that military families are getting bullied by ISIS now on Facebook. They are being contacted and threaten with death. Here are some simple ways you can secure your Facebook account and avoid being bulled and hopefully avoid getting hacked. • Pick a strong password and never share it with anyone else. Use a combination of at least six numbers, letters, and punctuation marks (like ! and &). • Use Facebook’s extra security features such as setting up a one-time password to log into your account anytime you feel uncomfortable entering your real password on Facebook (ex: in a library or internet cafe). • Do not accept all Friend Requests. Not every Friend Request is legitimate. Keep your list of accepted friends and family close as you would in the non-digital world. • Be sure to watch what you place on your Wall. The Wall is exactly that, a wall such as the bulletin board at work or in school. When you make postings to your wall, the post is placed prominently on your Facebook site and also copied to all your friends and family as an update of what you are doing • Set up login notifications. Facebook can send you an alert every time someone accesses your account from an unknown computer or other device, enabling you to receive a warning that someone has gained unauthorized access to your account. ‪#‎NCSAM‬

Cyber Security Tip #9

Social Media Postings Can Reveal More Information Than You Think Security experts and privacy advocates have been warning for the past couple of years about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Geotags are not visible to the casual viewer, and many people may not realize they are there; however these hidden tags can often contain information that could be used to identify you or the places you visit frequently. Never post unflattering or embarrassing pictures (no matter how funny) that could come back to haunt you. Remember anything you post online is there forever! Carefully examine photos for identifying information such as the name of your school, the name of a sports team or organization you belong to, the address of the place you work or your favorite social hangout. Do not give out the full name of an individual in a photo captions. Remember pictures can also be copied or altered and used on other websites in ways that might be detrimental to your reputation. Another important tip is to never advertise that you are away from home! When you post that you’re on vacation, or when you “check in” to your favorite meeting place on social media sites that tells others not only where you are, but also that you’re not home. Your friends aren’t the only ones who’d like to know where you are. Thieves and stalkers do too. ‪#‎NCSAM‬

Cyber Security Tip #6

Cyber Security Tip #6: Encrypt Your Data With major data breaches being reported all too frequently, organizations are now placing increased emphasis on security of personal, private and sensitive information. One method of increasing security is through data encryption. Encryption is the process of scrambling a message or data so that no one but the sender and the intended recipient can read it. Encryption solutions generally encompass two types: hardware and software. Examples of hardware encryption include a pre-encrypted USB device or hard drive; software encryption consists of a program installed on a machine that encrypts some or all of the data on the system. A variety of encryption tools are available on online. It is important to note that any solution you implement should be compliant with accepted industry standards. It is recommended that you should minimally employ a 128-bit Advanced Encryption Standard (AES) solution. For more information on data encryption, please check out the Multi-State Information Sharing and Analysis Center website at:

Cyber Security Tip #5

Cyber Security Tip #5: Protecting Yourself on a Public Computer If you access the Internet from a shared computer, make sure you don’t leave anything behind Being able to access the Internet from different locations — the library, a computer lab at school, an Internet cafe — is a great convenience, but it can also pose a security risk to personal information. If you do access the Internet from a shared computer, here are a few things you need to remember. 1. Don’t check the “remember my password” box. 2. When you’re done, make sure you log off completely by clicking the “log off” button before you walk away. 3. If possible, clear the browser cache and history. 4. Never leave the computer unattended while you’re logged in. 5. Trash all documents you used, and empty the recycle bin.

Cyber Security Tip #4

Cyber Security Tip #4: Five cyber security tips everyone should be aware of. 1. If you don’t understand the warning message, say no. It’s easier to go back and say yes if you need to than be sorry and have to rebuild your machine. 2. Certificates: If you don’t understand a website certificate message, say no. It is easier to go back and say yes if you need to than be sorry and have to rebuild your credit. 3. Antivirus: Running antivirus does not slow your computer down nearly as much as a virus does. 4. Back-up: Backing up your data may seem like a waste of time — er, until you spill coffee all over your laptop. 5. Passwords: Writing down your password around your desk is about as secure as leaving a $20 bill lying on the dashboard of your car. How well do you trust anyone these days?

Cyber Security Tip #3

Cyber Security Tip #3: Protect Your Children Online It is important to talk to your children about online safety and let them know that you can be approached with questions about behaviors or problems that they may encounter when online. Parents can teach their children how to safely use a computer and the Internet. The Multi-State Information Sharing and Analysis Center listed some simple steps that parents can take to help reduce security risk to children. They are: • Keep your computer in a central and open location in your home and be aware of other computers your child may be using. • Discuss and set guidelines and rules for computer use with your child. Post these rules by the computer as a reminder. • Use the Internet with your child. Familiarize yourself with your child’s online activities and maintain a dialogue with your child about what applications they are using. • Implement parental control tools that are provided by some Internet Service Providers and available for purchase as separate software packages. • Consider using software that allows you to monitor your child’s e-mail and Web traffic.

Cyber Security Tip #2

Today’s cyber security tip is: Don’t get phished!  The most common and easily detected cyber-crime is phishing. Phishing is a malicious attempt by hackers to acquire sensitive information, such as passwords and credit card numbers, through electronic media. Hackers often pretend to represent a bank or other trusted source in order to lure victims into disclosing information the hacker can then use to access their finances.   Always think before you click on a link or attachment in an email, even if it’s from somebody you know.  Look for oddly spelled words and strange attachments.  Even if it’s from someone you know, ask yourself: ‘Would they really send this?’

Cyber Security Tip #1

Today marks the 1st day of Cyber Security Month.  For the next 31 days, I will be posting tips and tricks on how to stay safe and secure online.  Today’s tip is: Change your password.  It is important that individuals change their password every three months in order to avoid being hacked.  The number one cause of cyber-attacks is a weak password.  Take the Password Challenge and see if your password is strong enough to pass.  You can take the password test by clicking here:  #NCSAM @cyber