Information Technology Specialist
204 Hickory Oak Hollow
Cumming, GA 30040
Mon-Fri 9am-6pm
Evenings & Saturday by Appointment
770-744-2084 Email Gary at GaryHelm.Net
Near Me: Cumming Georgia, Forsyth County GA, Dawsonville GA, Gainesville GA, Dahlonega GA, Lake Lanier, Free Home GA, Ball Ground GA, Johns Creek GA, Milton GA
Cybersecurity Awareness Month
October 2024
GaryHelm.net is a registered
Cybersecurity Awareness Month Champion Organization
Cybersecurity Awareness Month is an international collaborative effort of governments and the private sector ... to
- Increase Awareness
- Inform Individuals, Companies and Organizations
- and Provide Resources
Cybersecurity Awareness Month is Sponsored by:
CISA.gov Cybersecurity & Infrastructure Security Agency,
staysafeonline.org National Cybersecurity Alliance
and thousands of governement agencies, companies and individuals in the US and beyond.
What is Cybersecurity?
Cybersecurity refers to best practices and technologies used to protect users, systems and information against malicious activity by criminals.
Six primary areas related to cybersecurity are:
- Identify Risk
- Prevent Threats
- Detect Problems
- Mitigate Damage
- Report Incidences
- Recovery
Cybersecurity Awareness Month 2024 focuses on Four Basics for safe use of the Internet and Technology:
- Use Secure Passwords and Password Managers
- Use Multi-Factor Authentication
- How to Recognize and Report Phishing
- The importance of Installing Updates
October 1-7
Use Strong Passwords and Password Manager
Short passwords and passwords containing words need to be a thing of the past.
With lists of over ten-million commonly used passwords available on the Internet, those millions of passwords should never be used.
Last year a security firm used artifical intellegence (AI) to guess passwords. Over eighty percent of all passwords, with eight characters or less were discovered in less than one hour.
If a password does not provide you with any protection there isn't much use in having one.
This is why passwords need to be at least sixteen characters long, using randomly selected Upper and lower case letters, with numbers and symbols is recommended.
Secure-Our-World-Passwords-Tip-Sheet.pdf
Secure-Our-World-Passwords-Tip-Sheet
Webite Links
Use Secure Passwords
Use a Password Manager
Password Managers are apps or programs you can install on your computer, tablet or phone.
A password manager can create complicated passwords, encrypt them, store them and recall them as needed.
Using a password manager you need to remember only one password. The app will remember the others for you.
Use Password Manager
October 8-14
Turn On Multifactor Authentication
Multi-Factor Authentication is a step beyond simply using a password to access a secure website or app.
After successfully entering the user name and password, a code is sent to your phone or email to confirm you, not someone else, entered your user name and password.
Some multi-factor authentications may use facial recognition or other bio-metric methods, or a key card containing your authentication.
Using multi-factor authentication is not a failsafe method but it is a step in the right direction to securing your information.
October 15-21
Recognize and Report Phishing
You Are Your Best Defense against Phishing
Almost all cybercriminals gain access to networks and computers through someone providing information to Phishing.
- So what is Phishing?
- How can you recognize Phishing?
- What to do when you get Phished
Phishing is when a cybercriminal claims they are a trusted individual or company, asks you to provide information so they can use it for criminal activity.
Phishing might look like it's from your boss, a co-worker, a trusted company or individual such as Norton, McAfee, Microsoft, your bank or a government official.
Phishing might come to you as an email, a phone call, text message or pop-up on your screen.
Phishing usually asks you to click on a link, download something, call a phone number or answer the email or text message.
Phishing is done by "professional criminals"; they know what they are doing, and how to get you to do what they want.
Phishing uses "Social Engineering". We have been taught to respond in certain ways to certain events, and cyber-criminals use this against us.
Secure-Our-World-Phishing-Tip-Sheet
Secure-Our-World-Phishing-Tip-Sheet
Stay Safe Online - Phishing, Don't take the Bait
Phishing Fraud & Theft
Recognize and Report Phishing web page and video
CISA.gov - Recognize & Report Phishing
October 22-31
Update Software
"I Know" updates can be aggravating - they take up your time and always seem to happen when you are in the middle of something.
But Security Updates are for your own good, and the good of others.
There are a lot of different security updates:
- Microsoft Windows updates, Apple updates, Android updates
- Microsoft software updates, Office
- Security software updates, Anti-Malware and Antivirus
- Other software updates, Web Browsers
- Manufactor Firmware and Driver updates, computers,
- Modem/Router Firmware updates
For the most part these are security updates to fix known problems that can allow unauthorized access by others.
Report Cyber-Crimes & Cyber-Criminals
Examples of Cyber-Crimes
- Phishing Scam
- Impersonation
- Identity Theft
- Stalking Online
- Cyberbulling
- Tech Support Scams and Phantom Hackers
- Unauthorized Access - Hacking
- Corportate /Business Espionage
- Intellectual Property Rights Infringement
- Ransomware, Malware, Viruses
- Fraud
Stay Safe Online - Report Cybercrime
Stay Safe Online - Report Cybercrime
FBI's Internet Crime Complaint Center (IC3) .. report crimes
FBI Complaint Center
Department of Homeland Security
Department of Homeland Security
FBI
FBI.gov
FTC
FCC
FCC.gov
TSA
TSA.gov
Georgia Bureau of InvestigationGBI Specialized Units
Georgia Emergency Management
Georgia Report Cyber-Crime & Threats
FTC.gov Report Scams
Additional Resources
It is not a question of "If", it is a question of "When".Be Prepared for a Cyberattack
General Information
DHS - Cybersecurity Preparedness web
Be Prepared Tip Sheet
DHS - Be Prepared Cyberattack Tip Sheet pdf
What to do "When" anything happens
NIST - Computer Security Incident Handling Guide pdf
Cybersecurity Survival Guide
NCA - Cybersecurity Survival Guide web
Ten Basic Steps you can take to help prepare for cyberattacks.
NCA - Online Safety Basics web
Back IT Up
"Things Happen" - When your computer, table, phone or other device quits working, having a backup can save the day.
When your systems are compromised by a cyber-attack or failed update, having backup systems can save the day.
Back It Up
my blog - Back It Up
US-CERT Data Backup Options
US-CERT - Data Backup Options pdf
NIST/NCC0E MSP Protecting Data Extended
NIST/NCC0E - MSP Protecting Data Extended pdf
WI-Fi
Using a VPN service can help protect you from hackers by hiding your location and encrypt data.
Use VPN "Pull the Shades Down"
NCA - VPN Pull the Shades Down web
Protect your home Wi-Fi network
How to Secure Your Home Wi-Fi
Your router has a default user name and password. If it is not changed, there are lists of default passwords on the Internet.
FTC - Secure Your Wi-Fi Network web
Tech Support Scams
Federal Trade Commission advice "How to Spot, Avoid and Report Tech Support Scams"
FTC - Avoid Tech Support Scams web
MULTI-LAYER TECH SUPPORT SCAM - Highly Organized Scammers
FBI/ic3 - Phantom Hacker web
- Phantom Hacker 1
claims to be tech support - Phantom Hacker 2
claims to be financial institution - Phantom Hacker 3
claims to be US Gov Official
Social Media
Social Media Poster
Social Media Poster
Take Back Control of a Social Media Account
HAS Links to Facebook, YouTube, Google, WhatsApp, Instagram, TikTok, LinkedIn, SnapChat, Reddit, Pinterest, X (Twitter), Discord, Blue Sky, Mastodon
NCA - Take Control of Social Media web
That Hard to find 'Report Compromised Facebook Account' page
FB - Report Hacked Facebook Account web
Facebook Help Center
Hacked and Fake Accounts (Hacked and Impersonation on Facebook)
FB - Facebook Help web
SENIORS & Elders
"Phantom Hacker"
is a MULTI-LAYER TECH SUPPORT SCAM
Highly Organized, Highly Proficient
- phase 1 Tech Support IMPOSTER
- phase 2 Financial Institution IMPOSTER
- phase 3 US Gov Official IMPOSTER
FBI/ic3 - Phantom Hacker web
FBI/ic3 - 2023 Elder Fraud Report pdf
Increase of Tech Support Scams targeting Older Adults
FBI/ic3 - Increase in Tech Support Scam webs
Children, Students and Families
Tip Sheet for Parents to Help Children Use Technology SafelyCISA - Secure-Our-World-Raising-Digital-Citizens-Tip-Sheet pdf
DOJ/OVC - Internet Crimes Against Children web
Atrificial Intellegence
Secure-Our-World-Using-AI-Tip-SheetCISA - Secure-Our-World-Using-AI-Tip-Sheet pdf
Workplace Security & Training
Puzzels and Games
Fun Ways to Learn about CybersecurityCybersecurity-Awareness-Month-2024-Puzzles
NCA - 2004 Cybersecurity Puzzels pdf
CISA Cybersecurity Games
CISA Cybersecurity Games web