National Cybersecurity Awareness Month Safe Practices/Best Practices

By Stay Safe Online - Published, October 15, 2019

Two critical factors in cybersecurity are to Prevent and Protect, and these factors must be executed in everything that we do in the cyber world. You can initiate the prevention process by limiting the amount of personal information that is publicly available about yourself. This starts by using safe practices when using mobile devices, applications, email, and social networks.

Applying the following safe practices can greatly reduce the potential of threats and increase your cybersecurity posture.

Devices

Attackers will work tirelessly to gain control of your devices, compromise your email or messages, or spy on your online activities. We can greatly reduce the risk of compromise by adhering to the following mobile security best practices:

  1. Install reputable anti-malware programs from a trusted source
  2. Keep all device software and applications up to date
  3. Protect devices and accounts with PINs and strong passwords
  4. Only download reputable apps, and don’t give apps access to data that is not required for the functionality of the application
  5. Think before you click! Some links and applications could contain viruses or be a part of a phishing attack
  6. Be mindful of “Free” offers online, they are known for including malware
Passwords

Always use a strong password! The DoD suggests that passwords be a minimum of 15 characters in length and contain a combination or lowercase letters, uppercase letters, numbers, and special characters. Do not include your name or personal information in your password, and refrain from using simple dictionary words and numerical patterns. Keep in mind that you should not use the same password for different social network sites or on multiple applications.

Settings

Modifying your default security settings is one of the first steps in maintaining a secure and safe online persona. Many of the applications we use every day have security settings that are left open, unsecure, and vulnerable by default. It is critical that we manage our privacy and security settings so that little to no information is revealed publicly. Do not allow your profile to be viewed by individuals who you do not know or to services without your consent. Remember to use the strongest security settings when editing your profile.

Posts, Photos and Friends

Watch what you post! Remember that once you post something online, it is posted forever. Make sure you think twice about posting status updates, photos, or comments that you wouldn’t want your future employers or certain individuals to see. Remember that many photos that are posted will often have metadata inside the file which could contain location, system/device, and even personal information such as your name. When it comes to social media, everyone who sends you a friend request may not be your friend! Make sure to choose which friends you accept wisely.

If You Become Compromised

The most vigilant cybersecurity professionals can still fall victim to a cyber-attack, malware or online fraud. If you suspect you have become a victim of a cyber-attack, below are a few steps that you should immediately execute to protect yourself and prevent any additional compromise.

  1. Disconnect from the Internet immediately, this prevents additional data from being transmitted to the attacker.
  2. Scan Your Device with an up-to-date antivirus software and remove all threats or malware that have been detected.
  3. Close All Accounts that have been affected by the attack as soon as you are made aware of potential compromise. This can aid in preventing data theft before the attacker has time to access the account.
  4. Look for signs of identity theft and monitor your credit reports.

For additional details and tips, visit: https://staysafeonline.org/ncsam/.

TAGS: Cybersecurity

Related Policy
Related News
Related Resources