Cyber Security Tip #29

Cyber Security Tip #29: What to do if you’re a victim of cyber crime • File a report with your local law enforcement agency. Even if your local police department or sheriff’s office doesn’t have jurisdiction over the crime (a common occurrence for online crime which may originate in another jurisdiction or even another country), you will need to provide a copy of the law enforcement report to your banks, creditors, other businesses, credit bureaus, and debt collectors. • Even though you may not be asked to provide evidence when you first report the cybercrime, it is very important to keep any evidence you may have related to your complaint. Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence • Make sure you change your passwords for all online accounts. When changing your password, make it long, strong and unique, with a mix of upper and lowercase letters, numbers and symbols. You also may need to contact your bank and other financial institutions to freeze your accounts so that the offender is not able to access your financial resources. • In cases where the offender is known, send the stalker a clear written warning saying the contact is unwanted and asking that the perpetrator cease sending communications of any kind. Do this only once and do not communicate with the stalker again (Ongoing contact usually only encourages the stalker to continue the behavior). • If you believe someone is using your social security number for employment purposes or to fraudulently receive Social Security benefits, contact the Social Security Administration’s fraud hotline at 1-800-269-0271. Request a copy of your social security statement to verify its accuracy. ‪#‎NCSAM‬

Cyber Security Tip #28

Cyber Security Tip #28: Protect Your Identity From Cyber Thieves 1. Don’t carry your Social Security card in your wallet. If your health plan (other than Medicare) or another card uses your Social Security number, ask the company for a different number. 2. Identity thieves love passwords because they open doors to our personal information. Get tough and organized now. Use different passwords for all your accounts. Make those passwords strong with at least eight characters, including a mix of letters, numbers, and symbols ($+r0^gh@h@). 3. Stop most pre-approved credit card offers. They make a tempting target for identity thieves who steal your mail. Have your name removed from credit bureau marketing lists. Call toll-free 1-888-5OPTOUT (888-567-8688). Or opt out online at www.optoutprescreen.com. 4. Open your credit card bills and bank statements right away. Check carefully for any unauthorized charges or withdrawals and report them immediately. 5. When shopping online, check out a Web site before entering your credit card number or other personal information. Read the privacy policy and look for opportunities to opt out of information sharing. Only enter personal information on secure Web pages with “https” in the address bar and a padlock symbol at the bottom of the browser window. ‪#‎NCSAM‬

Cyber Security Tip #26

Cyber Security Tip 26: Avoid Fraudulent Phone Scams Cybercriminals don’t just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from companies such as Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. Convince you to visit legitimate websites (like www.ammyy.com) to download software that will allow them to take control of your computer remotely and adjust settings to leave your computer vulnerable. Request credit card information so they can bill you for phony services. Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there. Neither Microsoft nor legit computer software companies will make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes. ‪#‎NCSAM‬

Cyber Security Tip #25

Cyber Security Tip #25: Managing Your Digital Footprint Once information is online, sometimes it can be impossible to remove. Therefore you should be conscientious of your visible online presence known as your digital footprint, as criminals and fraudsters may utilize this information against you in various ways. Here are some recommendation for “mapping your digital footprint.” Look at all the social networking sites and forums that you belong to and search what information about you is available. Clean up your digital footprint. Remove any photos, content and links that may be inappropriate or reveal too much information. Be selective about who you authorize to access your information. Use the privacy features of your browser and of the various websites you frequent to reduce the visibility of your information. Since many comments on public websites can be publicly seen, monitor and moderate comments associated with you to maintain a positive digital footprint. Consider using the “block comments” features or setting your social networking profile to “private” so only designated individuals can view it. Always think before you post. ‪#‎NCSAM‬

Cyber Security Tip #23

Hackers are taking advantage of people’s fears regarding the latest Ebola outbreak. If you get an email from a seemingly trustworthy organization about the Ebola virus in the coming days, beware. It could very well be a scam to obtain your personal info. The emails look like they’re from organizations like the World Health Organization. But when you click on its attachments, they install a DarkComet Remote Access Trojan (RAT) onto your computer, giving hackers access to your computer and the files on it. Be sure to avoid emails with subject lines similar to the following: • RE: Ebola Survival Guide • What you need to know about the deadly Ebola outbreak • So Really, How Do You Get Ebola? • Ebola virus outbreak: Curing Breakthrough Revealed? • SHOCKING Health Alert: Secret Cure for Ebola? • HEALTH NEWS: Secret Cure for Ebola? • Is there ANY way to cure Ebola? ‪#‎NCSAM‬

Cyber Security Tip #22

Cyber Security Tip #22: Treat your personal information like cash Your Social Security number, credit card numbers, and bank account numbers can be used to steal your money or open new accounts in your name. So every time you are asked for your personal information — whether in a web form, an email, a text, or a phone message — think about whether you can really trust the request. Always ensure that the website requesting the information is encrypted. Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, the entire account could be vulnerable. Look for https on every page of the site you’re on, not just where you sign in. ‪#‎NCSAM‬

Cyber Security Tip #21

Cyber Security Tip #21: Surf Safe on the Internet It’s important to verify the sites you visit on the Internet. A certain amount of information (such as your IP address and domain name) is automatically sent when you connect. Web sites can also track the pages you visit, determine the version of your browser and operating system, and even compromise files and passwords. Below are a few helpful tips on how to keep safe on the Internet: • Keep your operating system updated and patched. • Use anti-virus and anti-spyware software and keep them updated. • Do not visit un-trusted websites or follow links provided by unknown or un-trusted sources. • Keep your applications (programs) updated and patched, particularly if they work with your browser such as multi-media programs used for viewing videos. • Block pop-up windows, some of which may be malicious and hide attacks. This may block malicious software from being downloaded to your computer. ‪#‎NCSAM‬

Cyber Security Tip #20

Stranger Danger Parents are constantly reminded about teaching their kids to protect themselves against online strangers, but these individuals can pose just as great a threat to adults. When interacting with people online in any environment, you should exercise extreme caution. Especially if someone begins asking for personal information or attempts a sales pitch. Online harassment and abuse can also be a serious problem for both kids and adults. If someone you talk to online is becomes abusive or harasses you, immediately drop contact before things escalate. Be careful whom you befriend online — not everyone is friendly or forthcoming on the Internet. ‪#‎NCSAM‬

Cyber Security Tip #19

Using Gift Cards this Holiday Season With so many breaches occurring at retail stores nation wide, it is no wonder shoppers are iffy on using their credit and debit cards this Holiday season. To avoid being a victim of a breach, cyber security experts recommend you going to your financial institute and obtain a registered gift card to do your online shopping. It won’t be tied to any of your bank accounts and may even help with your Holiday budgeting. ‪#‎NCSAM‬

Cyber Security Tip #18

Be Cautious of Work At Home Scams Working from home, earn $500 a week commission. It sounds to good to be true, and it is. Scammers pass stolen cash to unsuspecting people, who transfer it back to the thieves via electronic payment. Your job with the work taken out is money laundering. Beware. If you ever unsure on if a work at home site is legit or any other online internet service offered be sure to act on your doubts. If you think an online shop or service is dodgy, do some checking. A WHOIS search may let you see the registration details of a site. Visit the website www.whois.net and check out your suspect site. Companies House also enables you to check out details about company addresses, owners and the like. Look for big discrepancies between onscreen addresses and physical offices. ‪#‎NCSAM‬