Cybersecurity doesn’t have to be a “control” issue. Instead, make cybersecurity about protection and education. Use software to enforce family rules and routinely talk with your children about internet dangers.
Want to know more about raising “digital citizens?” Visit the National Cyber Security Alliance.
Identity theft is the act of using someone’s personal identifiable information (such as name, address, account number, driver’s license number, Social Security number, or health insurance number) without that person’s knowledge, and using the assumed identity to commit fraud or theft.
Identity thieves steal bank and tax information, as well as credit card applications and statements. Thieves may use illegal storage devices called “card skimmers” that obtain the name, account number, and expiration date of debit and credit cards when swiped at ATM machines, restaurants, retail stores, etc. Businesses have also fallen victim to identity thieves, and names and personal and financial information have been stolen from their employees and customers. Thieves can even steal personal identifiable information by digging through someone’s garbage.
The Federal Trade Commission provides detailed advice to help with the theft of personal records and information. Visit IdentityTheft.gov .
Passwords are important because they allow you to protect your financial and personal information. In June 2017, the National Institute for Standards and Technology issued new guidance (PDF) for passwords that changed many old assumptions for choosing passwords.
This is a trick question! Simple passwords are frequently used and can be cracked within 5 minutes, if not seconds. Examples of most-used, easily cracked passwords:
Don’t rely on your web browser to protect you from malicious websites. Even if you have high security settings and antivirus software, visiting a risky website can result in viruses, spyware or worse.
If your computer isn’t secure, what you use it for will be insecure. Here is a quick list of items for you to consider to better your overall computer security.
Criminal attacks on mobile phones typically take advantage of device features that are similar to computers. However, the convenience of mobile phones also makes them vulnerable to a range of other attacks.
For example, mobile phones are easy to steal – and that includes data stored on the phone, from personal identifiers to financial and corporate data. Additionally, anyone – including criminals – can develop apps for some of the most popular mobile operating systems. Even legitimate smartphone software can be exploited.
The Wolf Administration put together a team of professionals from all areas of state government to develop online resources to help protect you and your family as you navigate the internet in your daily lives.
Cybercriminals continue to target consumers and businesses, and we must remain ever vigilant in our efforts to protect ourselves from attack. Pennsylvania’s state government continues to work collaboratively with federal authorities and other state agencies to address cybersecurity challenges. We will continue to assist Pennsylvanians by highlighting and providing resources relating to cybersecurity threats and best practices.
WORK SMART. LIVE HAPPY.