Basic Cybersecurity Tips to Keep Your Data Safe

Published, January 12, 2017

Fast Fact IconWhen using a laptop at work and/or at home, you should be taking a few basic steps to keep your data safe and your system operational.

For example, here are some specific things we all can do:

  • Do not open attachments unless they are expected and come from a known and trusted source, and do not execute software that is downloaded from the internet (if such actions are permitted) unless from a trusted source or the download has been scanned for malware.
  • Be cautious when clicking on URLs in emails or social media programs, even when coming from trusted sources and friends.
  • Deploy a web browser URL reputation plugin solution that displays the reputation of websites from searches (various software security vendors offer a capability to validate a URL that you click on, or a URL associated with a webpage in a search list)
  • Be aware of and practice safe online conduct. Offers that look too good to be true usually are, and hot topics are prime bait for scams. Not all links lead to real login pages.
  • For your personal web interfaces, adopt two-step authentication on any website or app that offers it.
  • Employ password discipline. Have different passwords for every email account, applications and login, especially for work-related sites and services.
  • Use common sense. Having antivirus and security software doesn’t mean it is OK to visit malicious or questionable websites.
  • Raise the alarm if you see anything suspicious.
Our last Fast Fact provided information on the required Cyber Awareness Training for all personnel who access information systems on unclassified or secret networks. Here is some key information to keep handy.

After Oct. 1st of each year, Cyber Awareness Training needs to be done again for that year. Each person can satisfy the training requirement by completing one of the following: Cyber Awareness Challenge, Cyber Awareness Challenge Intelligence Community, or IC-Intelligence System Security Awareness depending on where you work. Your local Information System Security Manager or ACTR will be able to tell you which training to take. The preferred method of completing the training for Military and DoD Civilians is through TWMS since your records are updated automatically.

For more information, visit the DON SECNAV SharePoint Portal.

TAGS: Cybersecurity

Related Policy
Related News
Related Resources