Recent News

Stay Social Media Savvy

 

Stay Social Media Savvy

Privacy and Security Settings:

Keep all your social networking profiles like Facebook, Twitter, Snapchat, Instagram etc. set to private. Your personal information such as your (full name, date of birth, phone number, posts and pictures, etc.) is public, if you do not choose the private and security settings. Read your social network site rules and policies.

Banking Online Tips

http://staysafeonline.org/download/datasets/2028/Passwords.jpg

Protect Yourself and Your Family When Banking Online!

Use These Tips When Banking Online

Identity Theft

cid:image006.jpg@01D2294C.655D6AC0

Tips To Prevent Identity Theft

  • Make passwords long and strong:  Combine capital and lowercase letters with numbers and symbols for a more secure password

  • Watch out for shoulder-surfers  When entering a PIN number or a credit card number in an ATM machine, or on a computer at work, be aware of who is nearby and make sure no one is peeking over your shoulder to make a note of the keys you’re pressing.

  • Shred everything One of the ways that would-be identity thieves acquire information is through “dumpster-diving”, aka trash-picking.

Lock Down Your Login

Stay Safe On-Line

Why Lock Down Your Login?

According to NCSAM 72 percent of Americans believe their accounts are secure with only usernames and passwords, yet every two seconds there is another victim of identity fraud. Your usernames and passwords are not enough to keep your accounts secure. So what can you do about it?  

Keep A Clean Machine

Keep A Clean Machine

Improve your on-line experiences by applying security measure and principles that will definitely make it harder for someone to gain unauthorized access to your network. Along with the resources found on the NCSA website (Stay Safe Online ) you can visit www.cybersecurityforeveryone.com for more information on how to “KEEP A CLEAN MACHINE” and protect yourself on-line.

Physical Security - Our Shared Responsibility

Physical Security – Our Shared Responsibility

cid:image006.png@01D22938.22B2B450

  • Monitor and control who is entering your workplace: current employees, former employees, commercial delivery, and service personnel.
  • Check for identification and ask individuals to identify the purpose of their visit to your workplace.
  • Report broken doors, windows, and locks to your organization’s or building’s security personnel as soon as possible.

National Cyber Security Awareness Month

Securing our online lives is shared responsibility. Get involved this October and empower our global digital society to use the Internet safely and securely.

Cyber Bullying

Cyber-bullying as defined by the website www.stopbullying.gov is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyber-bullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

Internet of Things 101

STOP.THINK.CONNECT.: WHAT DO YOU KNOW ABOUT THE “INTERNET OF THINGS (IoT)”?

Have you ever heard about the “Internet of Things (IoT)”?

2015's Worst Passwords

STRONG PASSWORDS

Should include letters, numbers, symbols, upper and lower case and be at least 12 characters long (the longer the password the better the protection)

Below is Splashdata's complete list of the 25 worst passwords for 2015, is your password on the list?

1.    123456

2.    password

Pages