Computer Repair and Network Support Services



Gary Helm
Information Technology Specialist
204 Hickory Oak Hollow
Cumming, GA 30040

Mon-Fri 9am-6pm
Evenings & Saturday by Appointment

770-744-2084 Email Gary at GaryHelm.Net

Near Me: Cumming Georgia, Forsyth County GA, Dawsonville GA, Gainesville GA, Dahlonega GA, Lake Lanier, Free Home GA, Ball Ground GA, Johns Creek GA, Milton GA


Gary Helm

Cybersecurity Awareness Month
October 2024


Cybersecurity Awareness Month

GaryHelm.net is a registered Cybersecurity Awareness Month Champion Organization
Cybersecurity Awareness Month is an international collaborative effort of governments and the private sector ... to

  • Increase Awareness
  • Inform Individuals, Companies and Organizations
  • and Provide Resources
For safe use of the Internet and Technology.

Cybersecurity Awareness Month is Sponsored by:
CISA.gov Cybersecurity & Infrastructure Security Agency,
staysafeonline.org National Cybersecurity Alliance
and thousands of governement agencies, companies and individuals in the US and beyond.


What is Cybersecurity?
Cybersecurity refers to best practices and technologies used to protect users, systems and information against malicious activity by criminals.
Six primary areas related to cybersecurity are:

  • Identify Risk
  • Prevent Threats
  • Detect Problems
  • Mitigate Damage
  • Report Incidences
  • Recovery

Cybersecurity Awareness Month 2024 focuses on Four Basics for safe use of the Internet and Technology:

  • Use Secure Passwords and Password Managers
  • Use Multi-Factor Authentication
  • How to Recognize and Report Phishing
  • The importance of Installing Updates



October 1-7
Use Strong Passwords and Password Manager


Cybersecurity Awareness Month

Short passwords and passwords containing words need to be a thing of the past.

With lists of over ten-million commonly used passwords available on the Internet, those millions of passwords should never be used.

Last year a security firm used artifical intellegence (AI) to guess passwords. Over eighty percent of all passwords, with eight characters or less were discovered in less than one hour.
If a password does not provide you with any protection there isn't much use in having one.

This is why passwords need to be at least sixteen characters long, using randomly selected Upper and lower case letters, with numbers and symbols is recommended.


Secure-Our-World-Passwords-Tip-Sheet.pdf
Secure-Our-World-Passwords-Tip-Sheet
Webite Links
Use Secure Passwords



Use a Password Manager


Password Managers are apps or programs you can install on your computer, tablet or phone.
A password manager can create complicated passwords, encrypt them, store them and recall them as needed.
Using a password manager you need to remember only one password. The app will remember the others for you.
Use Password Manager



October 8-14
Turn On Multifactor Authentication


Cybersecurity Awareness Month

Multi-Factor Authentication is a step beyond simply using a password to access a secure website or app.
After successfully entering the user name and password, a code is sent to your phone or email to confirm you, not someone else, entered your user name and password.
Some multi-factor authentications may use facial recognition or other bio-metric methods, or a key card containing your authentication.
Using multi-factor authentication is not a failsafe method but it is a step in the right direction to securing your information.

Secure-Our-World-MFA-Tip-Sheet.pdf
Secure-Our-World-Multi Factor Authentication -Tip-Sheet



October 15-21
Recognize and Report Phishing


Cybersecurity Awareness Month

You Are Your Best Defense against Phishing
Almost all cybercriminals gain access to networks and computers through someone providing information to Phishing.

  • So what is Phishing?
  • How can you recognize Phishing?
  • What to do when you get Phished

Phishing is when a cybercriminal claims they are a trusted individual or company, asks you to provide information so they can use it for criminal activity.

Phishing might look like it's from your boss, a co-worker, a trusted company or individual such as Norton, McAfee, Microsoft, your bank or a government official.

Phishing might come to you as an email, a phone call, text message or pop-up on your screen.

Phishing usually asks you to click on a link, download something, call a phone number or answer the email or text message.

Phishing is done by "professional criminals"; they know what they are doing, and how to get you to do what they want.

Phishing uses "Social Engineering". We have been taught to respond in certain ways to certain events, and cyber-criminals use this against us.


Secure-Our-World-Phishing-Tip-Sheet
Secure-Our-World-Phishing-Tip-Sheet
Stay Safe Online - Phishing, Don't take the Bait
Phishing Fraud & Theft
Recognize and Report Phishing web page and video
CISA.gov - Recognize & Report Phishing




October 22-31
Update Software


Cybersecurity Awareness Month

"I Know" updates can be aggravating - they take up your time and always seem to happen when you are in the middle of something.

But Security Updates are for your own good, and the good of others.

There are a lot of different security updates:

  • Microsoft Windows updates, Apple updates, Android updates
  • Microsoft software updates, Office
  • Security software updates, Anti-Malware and Antivirus
  • Other software updates, Web Browsers
  • Manufactor Firmware and Driver updates, computers,
  • Modem/Router Firmware updates

For the most part these are security updates to fix known problems that can allow unauthorized access by others.

Secure-Our-World-Software-Updates-Tip-Sheet
Secure-Our-World-Software-Updates-Tip-Sheet





Secure Our World

Report Cyber-Crimes & Cyber-Criminals



Examples of Cyber-Crimes

  • Phishing Scam
  • Impersonation
  • Identity Theft
  • Stalking Online
  • Cyberbulling
  • Tech Support Scams and Phantom Hackers
  • Unauthorized Access - Hacking
  • Corportate /Business Espionage
  • Intellectual Property Rights Infringement
  • Ransomware, Malware, Viruses
  • Fraud

Stay Safe Online - Report Cybercrime
Stay Safe Online - Report Cybercrime

Secure-Our-World-Reporting-Cybercrime-Tip-Sheet.pdf
Secure-Our-World-Reporting-Cybercrime-Tip-Sheet

FBI's Internet Crime Complaint Center (IC3) .. report crimes
FBI Complaint Center

FTC Avoiding and Reporting Scams
FTC.gov Report Scams

Secure-Our-World-Reporting-Cybercrime-Tip-Sheet
DHS Reporting Cybercrime Complaint




Additional Resources

It is not a question of "If", it is a question of "When".
Be Prepared for a Cyberattack

General Information

Be Prepared website
DHS - Cybersecurity Preparedness web
Be Prepared Tip Sheet
DHS - Be Prepared Cyberattack Tip Sheet pdf
Computer Security Incident Handling Guide
What to do "When" anything happens
NIST - Computer Security Incident Handling Guide pdf

Cybersecurity Survival Guide
NCA - Cybersecurity Survival Guide web

Ten Basic Steps you can take to help prepare for cyberattacks.
NCA - Online Safety Basics web

Stop Ransomware

CISA - Stop Ransomware August 29, 2024 Advisory pdf

CISA - Stop Ransomware Website


NIST Cybersecurity and Privacy Report
NIST Cybersecurity and Privacy Report 800-229 pdf
Cybersecurity Awareness Month - Poster
NCA - Cybersecurity Awareness Poster pdf

Back IT Up

"Things Happen" - When your computer, table, phone or other device quits working, having a backup can save the day.
When your systems are compromised by a cyber-attack or failed update, having backup systems can save the day.

Back It Up
my blog - Back It Up

US-CERT Data Backup Options
US-CERT - Data Backup Options pdf

NIST/NCC0E MSP Protecting Data Extended
NIST/NCC0E - MSP Protecting Data Extended pdf


Social Engineering


CISA - What is Social Engineering & How Does it Work web

WI-Fi

Using a VPN service can help protect you from hackers by hiding your location and encrypt data.

Use VPN "Pull the Shades Down"
NCA - VPN Pull the Shades Down web

Protect your home Wi-Fi network
How to Secure Your Home Wi-Fi
Your router has a default user name and password. If it is not changed, there are lists of default passwords on the Internet.
FTC - Secure Your Wi-Fi Network web

Tech Support Scams

Federal Trade Commission advice "How to Spot, Avoid and Report Tech Support Scams"
FTC - Avoid Tech Support Scams web

MULTI-LAYER TECH SUPPORT SCAM - Highly Organized Scammers
FBI/ic3 - Phantom Hacker web

  • Phantom Hacker 1
    claims to be tech support
  • Phantom Hacker 2
    claims to be financial institution
  • Phantom Hacker 3
    claims to be US Gov Official


Social Media

Social Media Poster
Social Media Poster

Take Back Control of a Social Media Account
HAS Links to Facebook, YouTube, Google, WhatsApp, Instagram, TikTok, LinkedIn, SnapChat, Reddit, Pinterest, X (Twitter), Discord, Blue Sky, Mastodon
NCA - Take Control of Social Media web

That Hard to find 'Report Compromised Facebook Account' page
FB - Report Hacked Facebook Account web

Facebook Help Center
Hacked and Fake Accounts (Hacked and Impersonation on Facebook)
FB - Facebook Help web

SENIORS & Elders

"Phantom Hacker"
is a MULTI-LAYER TECH SUPPORT SCAM
Highly Organized, Highly Proficient

  • phase 1 Tech Support IMPOSTER
  • phase 2 Financial Institution IMPOSTER
  • phase 3 US Gov Official IMPOSTER
FBI/ic3 Phantom Hacker Public Service Announcement
FBI/ic3 - Phantom Hacker web


The FBI tracks cybercrimes .. Persons over 60 reported over Three Trillion dollars lost to cybercriminals in 2023.
FBI/ic3 - 2023 Elder Fraud Report pdf

Increase of Tech Support Scams targeting Older Adults
FBI/ic3 - Increase in Tech Support Scam webs

Elder_Fraud_Tri-fold
NCA - Elder Fraud Tri-fold pdf

Children, Students and Families

Tip Sheet for Parents to Help Children Use Technology Safely
CISA - Secure-Our-World-Raising-Digital-Citizens-Tip-Sheet pdf
Stop Bullying
Stop Bullying . gov website
U.S. Department of Justice Bulletin - Internet Crimes Against Children
DOJ/OVC - Internet Crimes Against Children web

Atrificial Intellegence

Secure-Our-World-Using-AI-Tip-Sheet
CISA - Secure-Our-World-Using-AI-Tip-Sheet pdf

Workplace Security & Training

Cybersecurity Training Guide
CISA - Cybersecurity Training Guide pdf (booK)
NIST Business Quick Start Guide
NIST - Business Quick Start Guide pdf

Travel Tip Sheet

CISA Be Cyber-Smart while Travel Tip Sheet
CISA Travel Tip Sheet pdf

Puzzels and Games

Fun Ways to Learn about Cybersecurity
Cybersecurity-Awareness-Month-2024-Puzzles
NCA - 2004 Cybersecurity Puzzels pdf
CISA Cybersecurity Games
CISA Cybersecurity Games web

How to Get Involved

How to Get Involved in Cybersecurity Awareness Month
NCA - How to Get Involved in CAM pdf
Teach Others - Advocate Tip Sheet
NCA - Teach Others - Advocate Tip Sheet pdf
2004 CAM Toolkit Guide
NCA - 2004 CAM Toolkit Guide pdf
Cybersecurity Video Library
Cybersecurity Video Library
My Blog Articles