For Individuals & Families
The goal of this section is to help you quickly understand some of the different types of attacks used to trick people into giving out personal or financial information.
You will find useful approaches that are currently considered effective ways to limit your exposure to Cyberattacks and Cybercrimes.
Follow the 4 Most Important Steps
If you have not implemented the 4 steps, please go there first then come back here and continue.
Explore these topics:
Understand what an attack can look like
Stop | Think | Connect
Password Managers
Microsoft Authenticator
Understand what an attack can look like
Have you Received...
Have you received an email that says there is something wrong with your account, and it has a link to a page that looks just like your banks home page asking for your login info?
Have you received Voice mail threats from Social Security or the IRS saying you must contact them about a problem with your account or that you owe money now?
Have you received an SMS Text message that says your package cannot be delivered, there was a problem with your payment, click here to connect with a representative, or a Text message that says your credit card has been frozen, click here to speak with a representative to unfreeze your account?
Defining other Different Attacks
A short 1 minute read.
Understand what these are: Phishing, Vishing, SMSishing.
Touch poster to learn more.
Protect Your Computer From Malware
An informational 3 Minute Video from the FTC
Touch image to start video.
stop | think | connect
a 2 page summary of Basic Tips & advice
Stop | Think | Connect
Practical Tips about devices, your information, connecting with care. Stop Think Connect is a global online safety awareness project.
Touch poster to view.
Online Privacy and Security Useful Tips from FTC
Topics include Password setup, protecting your phone, using social media, and more. Touch poster to learn more.
(Hint: for setting up passwords, use a password manager)
password managers
Password Manager
A 2 minute read from Microsoft
Talks about what is and why to use a password manager. Touch poster to learn more.
Do you find yourself becoming overwhelmed with creating strong secure passwords, where to store them safely, and how to get to them quickly? Join the crowd. Now is a good time to understand what is and why to use a password manager. See below for Recommended Password Managers.
Recommended Password Managers from Carnegie Mellon University
A short read about what is and why use a password manager, along with a useful list of recommended password managers, how they are stored, and a pro and con list of each. Touch poster to learn more.
1Password (Pay)
Last Pass (Free & Pay)
Apple's iCloud Keychain (Free on iPhone)
KeePass (Free Open Source)
Internet Browser password managers are not as robust as a dedicated password managers at this time such as the ones listed. An internet browser password manager is one that is built into Google Chrome or Microsoft Edge just to name two of them.
This is not an exhaustive list, and you are encouraged to do your own research about password managers and which one you would like to use.
microsoft authenticator: What is it and Why use it
Microsoft Authenticator
Protect your accounts with a one-time password that changes every 30 seconds, and more. Touch poster to get the app and learn more.
Note: Though this section does not cover all possible issues, strategies, or techniques; however, there is much here to benefit from to have an effective impact.
Please note, this training and all materials here are not meant to replace your current organization or small business Cyber Security procedures. These are meant to increase your awareness and understanding and offer actionable accepted practices. Please consult your organizations or small business owners' policy if you have a question.