Tips for individuals, families & businesses, a learning challenge, & tools to create a cybersecurity plan
The goal of this section is to present information in a doable set of actions, with approaches that are currently considered effective ways to limit your exposure to Cyberattacks and Cybercrimes.
For Individuals & Families:
Follow CISA's 4 Most Important Steps that everyone should do
Explore other topics: Stop | Think | Connect, Password Managers, or more.
For Small Businesses:
CISA's 4 Steps
Go through each section
Check out the Cybersecurity Challenge
Look through the Cybersecurity Guide
When ready choose Create a Customized Planning Guide
When done save and print the plan.
This plan is endorsed by the SBA - U.S. Small Business Administration
Holding the line starts with you and me. Set aside a small amount of time to learn what is presented here to protect yourself, your family, your business, or your employer from Cyberattacks and Cybercrimes.
Note: Though this section does not cover all possible issues, strategies, or techniques, there is much here to benefit from to have an effective impact.
4 Single Most Important Steps CISA Advises Everyone to do
CISA - Cybersecurity and Infrastructure Security Agency
Touch Shields Up to go to the list
understand why & how much protection you will gain from being hacked just by enabling MFA: Multi-factor authentication
CISA: Always Enable MFA
An informational 1-minute video overview about MFA.
Using MFA with your account login's will greatly reduce the risk of being a victim of a cyberattack, according to CISA's Director Jen Easterly. Touch the video to learn more.
Understand methods hackers use to trick you into giving away important information
1. FTC - Federal Trade Commission Tips about Phishing
This is a brief 2 minute read.
Think before you act or click!
Phishing is when someone uses fake emails or texts – even phone calls – to get you to share valuable personal information, like account numbers, Social Security numbers, or your login IDs and passwords.
Scammers use information to steal your money, your identity, or both. They may also try to get access to your computer or network. If you click on a link in one of these emails or texts, they can install ransomware or other programs that lock you out of your data and let them steal your personal information.
Scammers often use familiar company names or pretend to be someone you know. They pressure you to act now – or something bad will happen.
2. Small Business Big Threat
SBDC Michigan & SBA
A short 1 minute read...Understand what these are: Phishing, Vishing, SMSishing. Don't take the bait!
Have you received an email that says there is something wrong with your account, and it has a link to a page that looks just like your banks home page asking for your login info?
Have you received Voice mail threats from Social Security or the IRS saying you must contact them about a problem with your account or that you owe money now?
Have you received an SMS Text message that says your package cannot be delivered, there was a problem with your payment, click here to connect with a representative, or a Text message that says your credit card has been frozen, click here to speak with a representative to unfreeze your account?
3. FTC - Tip
Protect Your Computer From Malware
An informational 3 Minute Video
Understand & don't take the bait! Touch image to start video.
4. TechCrunch - Article about Twilio
A short 2 minute read about the impact of successful Phishing
This is a real life situation where a number of employees were tricked into giving away login credentials to their work systems and got hacked. Touch the article to read how and why they fell for it. You'll be surprised and want to learn from this!
Methods that target 1000's of employee cellphones have been successful at gaining access to their businesses
A 3 minute read revealing a combined attack.
Examples of real life situations where 1000's of employees are being tricked into giving away login credentials to their work systems, including their MFA - Multifactor Authentication code, and are getting hacked. Find out how and why so many people are falling for this. You'll be alarmed and surprised.
A good way to combat this is to use an authenticator app offered by Microsoft, or use Google's authentication process.
Also "don't be so quick to click" on processes asking for your information.
stop | think | connect
a 2 page summary of Basic Tips & advice for Individuals, Families, & Small Business Owners
Stop | Think | Connect
An easy to read 2 page summary
Practical Tips about devices, your information, connecting with care & more. Touch poster for larger view.
FTC - Federal Trade Commission - More Useful Tips For Everyone
More useful tips and advice about online security, privacy, and scams.
Touch image to read.
A 2 minute read from Microsoft
Talks about what is and why to use a password manager, Touch article to open.
Do you find yourself becoming overwhelmed with creating strong secure passwords, where to store them safely, and how to get to them quickly? Join the crowd. Now is a good time to understand what is and why to use a password manager.
Recommended Password Managers from Carnegie Mellon University
A short read about what is and why use a password manager, along with a useful list of recommended password managers, how they are stored, and a pro and con list of each.
microsoft authenticator: What is it and Why use it
Protect your accounts with a one-time password that changes every 30 seconds, and more. Touch the image to get the app and learn more.
10 Tips for Small Businesses & more
cybersecurity challenge Learning session - test your knowledge
Cybersecurity Challenge - Test Your Knowledge
This is a training project developed by the Michigan Small Business Development Center, and the U.S. Small Business Administration
The Michigan SBDC and the U.S. SBA state "Our cybersecurity learning course will test your knowledge on computer systems, data breaches, mobile devices, physical security, international business, company data, passwords, and financial transactions. You will follow along with three small business owners and one cyber hacker."
an example cybersecurity planning guide for small businesses with a resource to create a customized plan
FCC - Federal Communications Commission
This is a detailed structured overview of what a Cyber Planning guide can look like. (45 pages)
Touch the image of the Cyber Security Planning Guide to open and read.
a sober warning to take action now to protect against cyber attacks and cybercrime
Whitehouse Statement to Businesses: A Call to Act Now
Recent world events have led to an increase in the number of malicious cyberattacks that were already on the rise.
Attacks are aimed at businesses small medium and large, government agencies, and anyone on the internet, anyone that uses a smartphone, or a flip-phone with just voice mail and SMS texting that live and work in the United States.
If you are not paying attention, you could open yourself or your business up to a cyberattack. SMB's - Small and Medium Businesses need to play a part in combating Cyberattacks.