For Individuals & Families
The goal of this section is to present information in a doable set of actions, with approaches that are currently considered effective ways to limit your exposure to Cyberattacks and Cybercrimes.
Follow CISA's 4 Most Important Steps that everyone should do
Explore these topics:
Understand what an attack can look like
Stop | Think | Connect
Password Managers
Microsoft Authenticator
Understand methods hackers use to trick you into giving away important information
FTC - Federal Trade Commission Tips about Phishing
This is a brief 2 minute read.
Think before you act or click!
Phishing is when someone uses fake emails or texts – even phone calls – to get you to share valuable personal information, like account numbers, Social Security numbers, or your login IDs and passwords.
Scammers use information to steal your money, your identity, or both. They may also try to get access to your computer or network. If you click on a link in one of these emails or texts, they can install ransomware or other programs that lock you out of your data and let them steal your personal information.
Scammers often use familiar company names or pretend to be someone you know. They pressure you to act now – or something bad will happen.
Defining other Attacks
A short 1 minute read...Understand what these are: Phishing, Vishing, SMSishing. Don't take the bait!
Have you received an email that says there is something wrong with your account, and it has a link to a page that looks just like your banks home page asking for your login info?
Have you received Voice mail threats from Social Security or the IRS saying you must contact them about a problem with your account or that you owe money now?
Have you received an SMS Text message that says your package cannot be delivered, there was a problem with your payment, click here to connect with a representative, or a Text message that says your credit card has been frozen, click here to speak with a representative to unfreeze your account?
FTC - Protect Your Computer From Malware
An informational 3 Minute Video
Understand & don't take the bait! Touch image to start video.
stop | think | connect
a 2 page summary of Basic Tips & advice
Stop | Think | Connect
An easy to read 2 page summary
Practical Tips about devices, your information, connecting with care & more. Touch poster for larger view.
Learn more about:
Locking down your login
Owning your online presence
Keeping a clean machine or device.
FTC - Federal Trade Commission - More Useful Tips For Everyone
More useful tips and advice about online security, privacy, and scams.
Topics include Password setup, protecting your phone, using social media, and more.
(Hint: for setting up passwords, use a password manager)
password managers
Password Manager
A 2 minute read from Microsoft
Talks about what is and why to use a password manager, Touch article to open.
Do you find yourself becoming overwhelmed with creating strong secure passwords, where to store them safely, and how to get to them quickly? Join the crowd. Now is a good time to understand what is and why to use a password manager.
Recommended Password Managers from Carnegie Mellon University
A short read about what is and why use a password manager, along with a useful list of recommended password managers, how they are stored, and a pro and con list of each.
1Password (Pay)
Last Pass (Free & Pay)
Apple's iCloud Keychain (Free on iPhone)
KeePass (Free Open Source)
Internet Browser password managers are not as robust as the these dedicated password managers at this time.
microsoft authenticator: What is it and Why use it
Microsoft Authenticator
Protect your accounts with a one-time password that changes every 30 seconds, and more. Touch the image to get the app and learn more.
Note: Though this section does not cover all possible issues, strategies, or techniques; however, there is much here to benefit from to have an effective impact.