What can I do to protect myself from a cybersecurity threat?
Page Content Portlet
What is a cybersecurity threat and what can I do to protect myself?
A cybersecurity threat is any circumstance or event that can impact or cause damage to an application, system, or network through unauthorized access, disclosure, change, or service denial.
Common cybersecurity threats include:
- Compromised Credentials
- Phishing Attack
- Business Invoice Fraud
- Brute-force Attack
- Denial-of-Service Attack
- Social Engineering
- Host Redirection
- Zero Day Exploit
Learn about phishing scams
Be suspicious of unexpected emails, phone calls, and offers that seem to good to be true. The goal of a phishing email is to gain information about you, steal money from you, or install malware on your device. The best way to be on the lookout for phishing scams is by avoiding emails from unfamiliar senders, looking for grammatical errors or any inconsistencies in the email that look suspicious, and hovering over any links you receive to verify what the destination is.
VPNs are key for online privacy when working remotely. Hackers target users of public Wi-Fi networks to steal their data for nefarious activities. A VPN connection establishes a secure connection between you and the internet. Via the VPN, all your data traffic is routed through an encrypted virtual tunnel, rendering your data useless to cybercriminals.
Use multi-factor authentication
Keeping user accounts secure is an important part of conducting everyday business. MFA enhances security by requiring users to identify themselves with more than a username and password. It also adds a layer of protection by requiring users to confirm additional credentials before accessing accounts, thereby preventing hackers from exploiting stolen credentials and devices.
Implement strong passwords
For each account, use unique passwords that are complex and contain multiple words, numbers, and special characters. With the increased proliferation of social media, anyone can access personal information that has been posted online. Avoid using your pet’s name, your hometown, the name of your college, and your favorite sports team. Finally, don’t share your passwords. It can be tempting when someone is helping you with an assignment to share your password, but it is never a good idea.
Think before you click
Resist the urge to click links in suspicious emails and be sure to visit websites directly. Always double check a URL before downloading any files to make sure you haven’t been directed to a different site. It may be tempting to share information about your life, but what you share can be used by others. Take a moment to think about what you are about to post on social media before you post it.