Contents

  1. What is a cyber attack?
  2. Protecting yourself
  3. Resources

What is a cyber attack?

A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch cyber attacks including malware, phishing

Cybercriminals use different methods to launch cyber attacks including malware, phishing, denial of service attacks, and ransomware.

What you can do to protect yourself

Here are some steps you can take to protect yourself from cyber attacks.

  • Be on the lookout for suspicious links, attachments, and downloads
    Malware and ransomware can be embedded in links, attachments, and downloads. Make sure a link is authentic before clicking on it.
  • Create and use strong passwords
    You should always use strong and long passwords that are difficult to hack. Use unique passwords, meaning a different one for each account. Passwords should be at least 8 characters in length and contain numbers, special characters, and capitalized letters.
  • Use multi-factor authentication whenever possible
    Multi-factor authentication adds an extra layer of security. If a service you are using offers multi-factor authentication, use it.
  • Use secure internet communications
    Use sites that use “HTTPS” if you will access or provide any personal information. Don’t use sites with invalid certificates.
  • Update your anti-virus software regularly
    Make sure your anti-virus software is up to date and updates are installed regularly.
  • Report anything suspicious to your IT department
    Report any suspicious emails, files, or links to your company’s IT department.

Additional resources from CISA.Gov

Threats

Protecting Against Ransomware

Protecting Against Malicious Code

Handling Destructive Malware

Understanding Denial-of-Service Attacks

Avoiding Social Engineering and Phishing Attacks

Preventing and Responding to Identity Theft

Email and Communication

Staying Safe on Social Networking Sites

Using Caution with Email Attachments

Reducing Spam

General Security Information

Securing Network Infrastructure Devices

Securing the Internet of Things

Home Network Security

Keeping Children Safe Online

Understanding Firewalls for Home and Small Office Use

Good Security Habits

Mobile Devices

Privacy and Mobile Device Apps

Holiday Traveling with Personal Internet-Enabled Devices

Cybersecurity for Electronic Devices

Using Caution with USB Drives

Securing Wireless Networks

Passwords

Supplementing Passwords

Choosing and Protecting Passwords

Safe Browsing

Shopping Safely Online

Understanding Bluetooth Technology

Understanding Website Certificates

Software and Applications

Understanding Patches and Software Updates