Skip to main content

Protecting yourself from cyber attacks

Contents

  1. What is a cyber attack?
  2. Protecting yourself
  3. Resources

What is a cyber attack?

A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch cyber attacks including malware, phishing

Cybercriminals use different methods to launch cyber attacks including malware, phishing, denial of service attacks, and ransomware.

What you can do to protect yourself

Here are some steps you can take to protect yourself from cyber attacks.

  • Be on the lookout for suspicious links, attachments, and downloads
    Malware and ransomware can be embedded in links, attachments, and downloads. Make sure a link is authentic before clicking on it.
  • Create and use strong passwords
    You should always use strong and long passwords that are difficult to hack. Use unique passwords, meaning a different one for each account. Passwords should be at least 8 characters in length and contain numbers, special characters, and capitalized letters.
  • Use multi-factor authentication whenever possible
    Multi-factor authentication adds an extra layer of security. If a service you are using offers multi-factor authentication, use it.
  • Use secure internet communications
    Use sites that use “HTTPS” if you will access or provide any personal information. Don’t use sites with invalid certificates.
  • Update your anti-virus software regularly
    Make sure your anti-virus software is up to date and updates are installed regularly.
  • Report anything suspicious to your IT department
    Report any suspicious emails, files, or links to your company’s IT department.

Additional resources from CISA.Gov

Threats

Protecting Against Ransomware(link is external)

Protecting Against Malicious Code(link is external)

Handling Destructive Malware(link is external)

Understanding Denial-of-Service Attacks(link is external)

Avoiding Social Engineering and Phishing Attacks(link is external)

Preventing and Responding to Identity Theft(link is external)

Email and Communication

Staying Safe on Social Networking Sites(link is external)

Using Caution with Email Attachments(link is external)

Reducing Spam(link is external)

General Security Information

Securing Network Infrastructure Devices(link is external)

Securing the Internet of Things(link is external)

Home Network Security(link is external)

Keeping Children Safe Online(link is external)

Understanding Firewalls for Home and Small Office Use(link is external)

Good Security Habits(link is external)

Mobile Devices

Privacy and Mobile Device Apps(link is external)

Holiday Traveling with Personal Internet-Enabled Devices(link is external)

Cybersecurity for Electronic Devices(link is external)

Using Caution with USB Drives(link is external)

Securing Wireless Networks(link is external)

Passwords

Supplementing Passwords(link is external)

Choosing and Protecting Passwords(link is external)

Safe Browsing

Shopping Safely Online(link is external)

Understanding Bluetooth Technology(link is external)

Understanding Website Certificates(link is external)

Software and Applications

Understanding Patches and Software Updates(link is external)