The Department will campaign in and through cyberspace to generate insights about malicious cyber actors, as well as defend forward to disrupt and degrade these actors’ capabilities and supporting ecosystems
Cybersecurity matters for everyone, even people who don't think they use technology directly. Nearly every aspect of modern life involves sharing digital information.
That's why, no matter the industry, cybersecurity is essential. Cybersecurity professionals work to keep personal and business information safe from current — and future — threats.
1. Encrypt your data
2. Backup your data
3. Make your old computers' hard drives unreadable
4. Secure your wireless network at your home or business
5. Use a firewall
6. Encrypt data on your USB drives and SIM cards
7. Disable file and media sharing if you don't need it
8. Create encrypted volumes for portable, private data files
9. Overwrite deleted files
10. Don't forget to delete old files from cloud backups
11. Consciously check and configure app privacy settings
12. Enable remote location and device-wiping
13. Take care of privacy settings immediately upon setup
14. Use MyPermissions.com to control app permissions in one fell swoop
5. Lock your smartphone and tablet devices
16. Disable automatic uploading
17. Disable Bluetooth when you're not using it
18. Get anti-virus or anti-malware protection for your mobile devices
19. Check your push notification settings on mobile devices
20. Enable Touch ID if you use an Apple device
21. Set up content filters
22. Set your device to automatically lock after a period of inactivity
23. Prevent your smartphone from being stolen
24. Use an on-device, personal firewall
25. Be mindful of eavesdroppers when shopping via your mobile device in public
26. Consider using a VPN
27. Maintain physical control over your devices
28. Use a personal hotspot
29. Maintain clear separation between personal and work devices
30. Implement a cyber security policy
31. Use encryption
32. Implement access control
33. Use a mobile device management platform
34. Follow security best practices when using video conferencing applications
35. Ensure that remote workers are educated about phishing
36. Consider using hardware security keys
37. Decide what you define as Personally Identifiable Information (PII)
38. Use secure passwords
39. Don't use Social Security numbers, phone numbers, addresses, or other personally identifiable information as passwords
40. Be overly cautious when sharing personal information
41. Watch out for impersonators
42. Share passwords carefully
43. Don't use the same password for more than one account or service
44. Watch out for theft of your government-issued identification numbers
45. Don't write your passwords down
46. Organize your passwords in logical groupings
47. Avoid faxing sensitive information unless absolutely necessary
48. Shred old documents and statements
49. Get rid of old data you no longer need
50. Properly dispose of electronics
51. Sign when using debit cards, don't enter your PIN
52. Sign up for email alerts for transactions
53. Review your statements regularly
54. Keep an eye out for small transactions
55. Be wary of offers of help following a data breach
56. Get a one-call fraud alert
57. Shop on familiar websites
58. Get a free credit report
59. Be careful shopping online — for personal and business purchases
60. Don't share too much information on social networking platforms
61. Customize your social networking privacy settings
62. Don't trust "friends" who claim to be mugged or have other unbelievable stories
63. Block suspicious or shady users on Facebook
64. Protect your Tweets
65. Check your privacy settings regularly
66. Know who your friends are
67. Use two-step verification for LinkedIn
68. Contact the social network to regain access, and let your friends know if you've been hacked
69. Avoid sensitive transactions on public Wi-Fi
70. Use website privacy settings
71. Don't forget to sign out
72. Don't open emails from people you don't know
73. Use two-factor authentication
74. Don't believe everything you read
75. Use secure websites, especially for sensitive transactions
76. Avoid clicking on links in emails
77. Be mindful of your online reputation
78. Don't download files from untrustworthy websites
79. Consider using a disposable email
80. Take advantage of secure mobile access options
81. Opt out of ad tracking
82. Don't save passwords in your browser
83. Use more than one email address for different contexts
84. Create a dedicated email address for long-term projects
85. Take stock of your digital footprint
86. Don’t use social media credentials to register for or sign in on third-party sites
87. Be careful when searching in categories known for malware
88. Don't send passwords or account login credentials over public or unsecured Wi-Fi networks
89. Store your most sensitive data locally
90. Regular password changes might not actually be necessary
91. Use an encrypted cloud service
92. Choose a safe, reputable email provider
93. Immediately change your passwords following a data breach
94. Verify that a breach has, in fact, occurred
95. Request a new card, if applicable
96. Consider a credit freeze
97. Take advantage of free credit monitoring
98. Don't ignore reports from friends about mysterious emails coming from your accounts
99. Know the warning signs that your data has been breached or that you've been hacked
100. Regain control over your compromised accounts
101. Find out precisely why the breach or hack occurred
You protect information by making it inaccessible to unauthorized users and rendering it unreadable or useless if it is compromised or accidentally disclosed. Multiple techniques are used to protect data from unauthorized access including:
Enforcing strong password policies
Encrypting data when at rest or in transit
Implementing multi-factor authentication
Backing up data to provide the possibility of recovery
Promoting a zero-trust approach to data security
Protecting your information is important because it is a valuable personal and business resource. Hackers are constantly trying to access sensitive data so they can use it to perpetrate crimes like identity theft. Leaving your data unprotected risks it being stolen or used for nefarious reasons. If personal information such as credit card and Social Security numbers are compromised, it can be a nightmare for individuals.
Multiple methods can be used to protect your information. The following are three of the most common and effective ways to keep your data secure.
Limit access to your data by password-protecting your information with a non-trivial password.
Encrypt data at all times so it cannot be used by unauthorized entities.
Back up data so it can be recovered in the event of a data loss.
The most secure way to protect data is by encrypting it at all times. Encrypting the data makes it useless to any unauthorized users who cannot decrypt the data. At a minimum, data should always be encrypted when being transmitted over public networks like the Internet. More effective protection can be achieved by encrypting data whenever it is in transit and when it is at rest and resident on a storage device.
Classified data is an organization’s most valuable and sensitive information. Its unauthorized disclosure can result in devastating consequences for the organization or affected individuals. The importance of classified data means it should be protected using the most effective methods. This includes encrypting the data at all times and restricting access to decryption keys. Only authorized personnel should be able to view classified data in its unencrypted form.
What is Cybersecurity by Juliana De Groot - the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.