Overview
The internet makes it easy to find information, connect with others, and learn new things. But it can also expose you or your business to scams, false information, and privacy risks if you’re not careful. Cybersecurity threats can even affect our critical infrastructure.
The Governor’s Office of Homeland Security (OHS) strengthens Pennsylvania's cybersecurity and online safety by:
- Coordinating cyber intelligence sharing
- Expanding statewide cyber resilience
- Providing training and resources to help governments and communities prevent and respond to cyber threats
More resources
If you own a smartphone, a computer, or another connected device, you should stay informed about the latest cybercrime trends and cybersecurity technologies to avoid attacks. Below are some resources that we recommend:
- A glossary of cybersecurity terminology
- Tips from the Federal Trade Commission for keeping you and your family safe
- Department of Homeland Security’s cybersecurity best practices and Cyber Security Evaluation Tool, which helps organizations look at how safe their computer systems are
- The Federal Communication Commission’s Small Biz Cyber Planner, which can help you create a custom cyber security plan for your company
Cybercrime can affect anyone, including individuals and businesses. It can impact finances and disrupt digital information systems by breaching data security and making services unavailable.
When to report
Make a report when you feel that you’ve been a victim of a crime or if there is:
- A significant loss of data, service, or system control
- A large number of victims
- Malicious software installed on or unauthorized access on a critical system
- An effect on critical infrastructure or government functions
- An impact on national or economic security
- An impact on public health or safety
What to report
- Who you are
- Who experienced the incident
- What occurred
- How the incident was detected
- What steps were taken
- Who was notified
Where to report cybercrime incidents
Report your issue to any of the agencies below.
| What to report | Agency | How to report |
|---|---|---|
|
|
|
|
|
|
|
| |
|
| |
|
|
Cyberbullying takes place virtually or through text messaging. Victims may experience many of the same effects as people who are bullied in person, such as low self-esteem or depression.
According to the Pennsylvania Office of Attorney General, cyberbullying can include:
- Sending cruel, vicious, or threatening emails, texts, or direct messages
- Creating websites that have stories, pictures, and jokes ridiculing others
- Posting pictures online with derogatory phrases or questions attached to them
- Using someone else's email to send vicious or incriminating emails to others
- Using someone else's social media account to send cruel or untrue messages while posting as that person
- Using instant messaging tools to harass others
If you or someone you know is a victim of cyberbullying, we recommend the following resources:
- Bullying and Cyberbullying Prevention Strategies and Resources from SchoolSafety.gov
- Get Help Now from StopBullying.gov
- Chatting with Kids About Being Online from the Cybersecurity & Infrastructure Security Agency (CISA)
- Chatting with Kids About Being Online from the Department of Homeland Security
- Dealing with Cyberbullies from CISA
OHS partners with Texas A&M Engineering Extension Service (TEEX) to deliver cybersecurity training courses to public and private partners.
Previous training topics include:
- Cybersecurity Risk Awareness for Officials and Senior Management
- Developing Cybersecurity Resiliency for Everyone
- Cybersecurity Resiliency in Industrial Control Systems
For more information on our training and exercises, visit our events page.
PA CyberCom
PA CyberCom reports on and shares crucial cybersecurity information. It promotes cybersecurity awareness across Pennsylvania to help the Commonwealth fight cyberattacks. Individuals and businesses also can report cybersecurity incidents to CyberCom.
In partnership with OHS, the unit coordinates cyber defense information sharing among:
- Public and private sector critical infrastructure
- Government agencies
- Law enforcement