Contents
What is a cyber attack?
A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch cyber attacks including malware, phishing
Cybercriminals use different methods to launch cyber attacks including malware, phishing, denial of service attacks, and ransomware.
What you can do to protect yourself
Here are some steps you can take to protect yourself from cyber attacks.
- Be on the lookout for suspicious links, attachments, and downloads
Malware and ransomware can be embedded in links, attachments, and downloads. Make sure a link is authentic before clicking on it. - Create and use strong passwords
You should always use strong and long passwords that are difficult to hack. Use unique passwords, meaning a different one for each account. Passwords should be at least 8 characters in length and contain numbers, special characters, and capitalized letters. - Use multi-factor authentication whenever possible
Multi-factor authentication adds an extra layer of security. If a service you are using offers multi-factor authentication, use it. - Use secure internet communications
Use sites that use “HTTPS” if you will access or provide any personal information. Don’t use sites with invalid certificates. - Update your anti-virus software regularly
Make sure your anti-virus software is up to date and updates are installed regularly. - Report anything suspicious to your IT department
Report any suspicious emails, files, or links to your company’s IT department.
Additional resources from CISA.Gov
Threats
Protecting Against Malicious Code
Understanding Denial-of-Service Attacks
Avoiding Social Engineering and Phishing Attacks
Preventing and Responding to Identity Theft
Email and Communication
Staying Safe on Social Networking Sites
Using Caution with Email Attachments
General Security Information
Securing Network Infrastructure Devices
Securing the Internet of Things
Understanding Firewalls for Home and Small Office Use
Mobile Devices
Privacy and Mobile Device Apps
Holiday Traveling with Personal Internet-Enabled Devices
Cybersecurity for Electronic Devices
Passwords
Choosing and Protecting Passwords
Safe Browsing
Understanding Bluetooth Technology
Understanding Website Certificates