October 9, 2020
DO YOUR PART. #BECYBERSMART
The following tip sheet and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Additional Resources: National Cybersecurity Alliance and CISA.gov
More of your home devices are now connected to the internet, including thermostats, door locks, and coffee machines. This enables us to control our devices on our smartphones, no matter our location, saving us time while providing convenience and safety. These technological advances are innovative and intriguing; however, they also pose a new set of security risks. #BeCyberSmart to connect with confidence and protect your digital home.
- Secure your Wi-Fi Network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username.
- Double you login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app, or a physical token.
- If you connect it, you must protect it. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on. If you’re putting something into your device, such as a USB for an external hard drive, make sure your device’s security software scans for viruses and malware. Finally, protect your devices with antivirus software and be sure to periodically back up any data that cannot be recreated, such as photos or personal documents.
- Keep tabs on your apps. A mobile application supports most connected appliances, toys, and devices. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
Read More Articles