If you are a victim of fraud, please contact us at 360-779-4567.For so many of us, cell phones and computers are embedded in our personal and professional lives. We talk and text, we browse the web, we watch, and we create. Our devices store a lot of personal information, so it’s a good idea to take a few minutes to make sure your computer, phone, and other connected devices are protected. Show
Browse by topic:Update Your SoftwareRecent Consumer AlertsCybersecurityProtecting Against RansomwareProtecting Against Malicious CodeStaying Safe on Social Networking SitesUsing Caution with Email AttachmentsShopping Safely OnlineResourcesAuthorsUpdate your softwareSoftware developers release updates — to software, operating systems, and internet browsers — to patch vulnerabilities before attackers can exploit them. Some programs are pre-set to update automatically. Check your settings and turn on automatic updates to keep up with the latest protections against security threats. If your software is not set to update automatically, you’ll have to update it manually. The same principles apply for your phone: set it to update automatically. Otherwise, keep an eye out for updates, and don’t delay in running them. Update your apps, too. Protect your accountsBesides securing your devices, protect your accounts. Start with strong passwords and enable multi-factor authentication. When it comes to passwords, longer is stronger: at least 12 characters. You could use a passphrase of random words to help you remember it — but avoid common words or phrases. If your username and password are leaked in a breach, having multi-factor authentication enabled will make it harder for a scammer to get into your account. For more, check out this password checklist. Back up important dataAs an extra precaution, back up your important data. Save your files to an external storage device, like a USB flash drive or an external hard drive. Also, save your information with an online cloud storage service. Get more advice about protecting your devices and your accounts.Search Terms cyber securityTopics Identity Theft and Online SecurityOnline Privacy and SecurityRelated ItemsProtect Your Personal Information and Data ^top Recent Consumer AlertsCybersecurity advice to protect your connected devices and accounts March 23, 2022 FTC says credit repair operation fleeced its clients March 21, 2022 HomeAdvisor’s home improvement leads needed work March 17, 2022 ^top CybersecurityCybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else’s system? What are the risks to having poor cybersecurity?There are many risks, some more serious than others. Among these dangers are malware erasing your entire system, an attacker breaking into your system and altering files, an attacker using your computer to attack others, or an attacker stealing your credit card information and making unauthorized purchases. There is no guarantee that even with the best precautions some of these things won’t happen to you, but there are steps you can take to minimize the chances. What can you do to improve your cybersecurity?The first step in protecting yourself is to recognize the risks. Familiarize yourself with the following terms to better understand the risks:
To minimize the risks of cyberattacks, follow basic cybersecurity best practices:
Refer to cybersecurity Tips and Cyber Essentials for more information from the Cybersecurity and Infrastructure Security Agency (CISA) on how to improve your cybersecurity posture and protect yourself and from cyberattacks. ^top RansomwareRansomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. (See Protecting Against Malicious Code for more information on malware.) After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers. If the threat actor’s ransom demands are not met (i.e., if the victim does not pay the ransom), the files or encrypted data will usually remain encrypted and unavailable to the victim. Even after a ransom has been paid to unlock encrypted files, threat actors will sometimes demand additional payments, delete a victim’s data, refuse to decrypt the data, or decline to provide a working decryption key to restore the victim’s access. The Federal Government does not support paying ransomware demands. (See the FBI’s ransomware article.) How does ransomware work?Ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files,
such as Once the ransomware has completed file encryption, it creates and displays a file or files containing instructions on how the victim can pay the ransom. If the victim pays the ransom, the threat actor may provide a cryptographic key that the victim can use to unlock the files, making them accessible. How is ransomware delivered?Ransomware is commonly delivered through phishing emails or via “drive-by downloads.” Phishing emails often appear as though they have been sent from a legitimate organization or someone known to the victim and entice the user to click on a malicious link or open a malicious attachment. A “drive-by download” is a program that is automatically downloaded from the internet without the user’s consent or often without their knowledge. It is possible the malicious code may run after download, without user interaction. After the malicious code has been run, the computer becomes infected with ransomware. What can I do to protect my data and networks?
What can I do to prevent ransomware infections?
How do I respond to a ransomware infection?
What do I do if my computer is infected with ransomware?
^top Malicious CodeMalicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.
How can you protect yourself against malicious code?Following these security practices can help you reduce the risks associated with malicious code:
What do you need to know about antivirus software?Antivirus software scans computer files and memory for patterns that indicate the possible presence of malicious code. You can perform antivirus scans automatically or manually.
Although anti-virus software can be a powerful tool in helping protect your computer, it can sometimes induce problems by interfering with the performance of your computer. Too much antivirus software can affect your computer’s performance and the software’s effectiveness.
There are many antivirus software program vendors, and deciding which one to choose can be confusing. Antivirus software programs all typically perform the same type of functions, so your decision may be based on recommendations, features, availability, or price. Regardless of which package you choose, installing any antivirus software will increase your level of protection. How do you recover if you become a victim of malicious code?Using antivirus software is the best way to defend your computer against malicious code. If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system. You should also consider these additional steps:
Threats to your computer will continue to evolve. Although you cannot eliminate every hazard, by using caution, installing and using antivirus software, and following other simple security practices, you can significantly reduce your risk and strengthen your protection against malicious code. ^top Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections. Although the features of social networking sites differ, they all allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messages) that enables you to connect with other users. On some sites, you can browse for people based on certain criteria, while other sites require that you be “introduced” to new people through a connection you share. Many of the sites have communities or subgroups that may be based on a particular interest. What security implications do these sites present?Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because
While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that’s available. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. (See Avoiding Social Engineering and Phishing Attacks for more information.) Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data. Additionally, because of the popularity of these sites, attackers may use them to distribute malicious code. Sites that offer applications developed by third parties are particularly susceptible. Attackers may be able to create customized applications that appear to be innocent while infecting your computer or sharing your information without your knowledge. How can you protect yourself?
Children are especially susceptible to the threats that social networking sites present. Although many of these sites have age restrictions, children may misrepresent their ages so that they can join. By teaching children about Internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users. (See Keeping Children Safe Online.) ^top Email AttachmentsSome characteristics that make email attachments convenient and popular also make them a common tool for attackers:
What steps can you take to protect yourself and others in your address book?
^top The internet offers convenience not available from other shopping outlets. You can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases from your home. However, the internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else. How do attackers target online shoppers?There are three common ways that attackers can take advantage of online shoppers:
How can you protect yourself?
^top Resourcesconsumer.ftc.gov https://www.us-cert.gov/ncas/tips ^top CISA FTC ^top Which is a best practice that can prevent viruses and other malicious code from being downloaded quizlet?Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Do not access links or hyperlinked media such as buttons and graphics in email messages.
What is a way to prevent the download of viruses?Install all system security updates, patches, and keep your defenses such as antivirus software, spyware, and firewall up to date. Regularly scan files for viruses.
What is the best way to protect your common access card or personal identity verification card?To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
What is an indication that a malicious code is running on your system?Examples of basic functions that are symptomatic of a malware infection include having a system that won't boot up, won't connect to the internet (or connects with a whole bunch of windows open to sites you didn't go to), won't perform basic functions, randomly shuts down, or does other weird things.
|