Internet and Computer Safety
CyberSecurity



Gary Helm
Information Technology Specialist
204 Hickory Oak Hollow
Cumming, GA 30040

Mon-Fri 9am-6pm
Evenings & Saturday by Appointment

770-744-2084 Email Gary at GaryHelm.Net

Near Me: Cumming Georgia, Forsyth County GA, Dawsonville GA, Gainesville GA, Dahlonega GA, Lake Lanier, Free Home GA, Ball Ground GA, Johns Creek GA, Milton GA


Gary Helm

Internet and Computer Safety
Cybersecurity



Staying Safe on the Internet and keeping our devises secure is not an easy challenge.
However, there are simple things you can do to be reasonably safe.

First, What is Cybersecurity?
Cybersecurity refers to best practices and technologies used to protect us, our systems and our information against the malicious activity of criminals, natural and man-made disasters, hardware failures, and just simple mistakes.

Cybersecurity focuses on six primary areas:

  • Identify Risk
  • Prevent Threats
  • Detect Problems
  • Mitigate Damage
  • Report Incidences
  • Recovery



Identify Risk

What are your risk? Most of use instantly think of getting a virus, getting hacked or scammed.
Human error, being misinformed or uninformed are the greatest risks.

Internal risks - employee theft
External risks - "bad actors"
Intrussion - "digital breaking and entering", corporate sabatoge,
Outdated hardware software that has not been updated.
Using default or weak password
Physical risks - lost or stolen property

Disaster Events - fire, flood, hurricane, tornado, loss of power, loss of internet, hardware failure.

It is not a question of if something bad will happen, it is a question of when.


Prevent Threats

Can you prevent something happening, or prevent a problem being worse than it could be?
Yes, there are things you can do.

It should go without saying: Use Security Software and Services, and Best Practices. Be Aware of what you are doing, what you click on, and where you are.

Be Proactive about Preventative maintenance

Have a plan. What are you going to do when (not if) something happens. Have a backup, have a secondary means or maintining operations.

Change default user name and passwords on modems and routers. All default user names and passwords are readily available on the internet. And update modem and router firmware regularly.

Use secure passwords. There are lists of most commonly used passwords readily available on the internet. And password discovery software combined with AI can easily detect any eight character password in under one hour.
Use two-step authentication whenever possible.
Keep your firmware, operating system and other software up-to-date. Updates frequently include "security updates" needed to keep bad-actors out.
Learn How to Recognize scams, spam, phishing and other attempts to obatin access to your systems and information.
For more information about these go to my Cybersecurity Awareness Month

Consider adding a firewall (or firewalls) between you and the outside world.

Segment your network, don't give everyone administrative control .. Most modems/router combinations have a setting to have primary and guest WiFi connections, use them. Consider adding a second router to further segment network connections.

Use a good VPN service whenever connected to the Internet, especially on public WiFi connections.

"Disasters" happen. A disaster does not have to be a hurricane, flood, fire or a software company sending out a bad update. For some a disaster can be a hardware failure, a computer, server or service quits working.

Some of the recent incidents I wondered why companies were not prepared. Why was there not a "secondary location" to operate from.

Have Backups. Online backup services are an excellent way to manage backups, and they provide that "secondary location" to some extent.
Else, use a local backup such as an external drive, or cloan drives for easy replacement. Use full backups and incramental backups.
Do Not rely on "syncronized" backups as an attack on the primary system can corrupt the backup with the problem you are experiencing.


Detect Problems

How do you detect a problem, potential problem, or a problem that is about to get worse?

Most of us use: "Things aren't working right", don't sound right, don't feel right, all the way to the obvious "It isn't working".
Check your computer logs for warnings and errors, or periodically have someone do that for you.
Check firewall logs to detect suspicious activity.

Consider "Penetration Testing" to discover systems and user weaknesses.

Consider software that monitors activity on you network.
Most of us can't have our systems monitored 24/7/365 to detect problems such as intrusion detection - as some should -
Small businesses and Home users are targets for hackers as well and some security suites include some intrusion or suspicious activity features.


Mitigate Damage

The First Step in Mitigating Damage is to be prepared, have a plan, and work the plan.

Disconnect - turn off the device that has been infected, breached or compromised.
Notify banks, credit companies and others as needed about problems or possible problems. Monitor your accounts for suspicious activity, and monitor for accounts being created that you did not.

Change all your passwords on all your internet accessable accounts.
Get someone who knows what they are doing, a professional to help you remove any potentially unwanted software and malware from you system(s).


Report Incidences

Reporting cyber-crimes helps make the Internet a safer place for you and everyone.


Secure Our World

Report Cyber-Crimes & Cyber-Criminals



Examples of Cyber-Crimes

  • Phishing Scam
  • Impersonation
  • Identity Theft
  • Stalking Online
  • Cyberbulling
  • Tech Support Scams and Phantom Hackers
  • Unauthorized Access - Hacking
  • Corportate /Business Espionage
  • Intellectual Property Rights Infringement
  • Ransomware, Malware, Viruses
  • Fraud

Stay Safe Online - Report Cybercrime
Stay Safe Online - Report Cybercrime

Secure-Our-World-Reporting-Cybercrime-Tip-Sheet.pdf
Secure-Our-World-Reporting-Cybercrime-Tip-Sheet

FBI's Internet Crime Complaint Center (IC3) .. report crimes
FBI Complaint Center

FTC Avoiding and Reporting Scams
FTC.gov Report Scams

Secure-Our-World-Reporting-Cybercrime-Tip-Sheet
DHS Reporting Cybercrime Complaint


Recovery

Recovery can be a slow "painful" process. In part it depends on how prepared you are.

As we have seen and experienced in recent months, even a security update can cause havock across industries.
Is there a backup plan for unexpected man-made or natural disaster.

Examples One and Two:
When CrowdStrike pushed out a security update, and Microsoft passed the update along to clients, it affected industies around the globe.
When Hurricane Helene dumped masssive volumes of rain over western North Carolina, families, communities and businesses were devistated.
One business in particular that had a regional affect. Ingles groceries had a lot of their technology centered in one location. When that location was damaged, Ingles was unable to conduct business as usual for days.

In each of these two examples, had companies had secondary locations (effective backup systems) to simply switch over to and use, neither of events would have been so disruptive.
By having a secondary location that was un-affected by the man-made or natural disaster, network administrators could have adjusted settings from the primary to the secondary network.
These steps would have been costly up-front, but much less disruptive and costly in the long-run.

Most of us do not need to go to these extremes to be prepared but basic precautions and preparedness can be less disruptive and costly in the long-run.


Additional Cybersecurity Information

For some practical Best Practices for staying safe on the Internet visit my Cybersecurity Awareness Month page.




Additional Resources

It is not a question of "If", it is a question of "When".
Be Prepared for a Cyberattack

General Information

Be Prepared website
DHS - Cybersecurity Preparedness web
Be Prepared Tip Sheet
DHS - Be Prepared Cyberattack Tip Sheet pdf
Computer Security Incident Handling Guide
What to do "When" anything happens
NIST - Computer Security Incident Handling Guide pdf

Cybersecurity Survival Guide
NCA - Cybersecurity Survival Guide web

Ten Basic Steps you can take to help prepare for cyberattacks.
NCA - Online Safety Basics web

Stop Ransomware

CISA - Stop Ransomware August 29, 2024 Advisory pdf

CISA - Stop Ransomware Website


NIST Cybersecurity and Privacy Report
NIST Cybersecurity and Privacy Report 800-229 pdf
Cybersecurity Awareness Month - Poster
NCA - Cybersecurity Awareness Poster pdf

Back IT Up

"Things Happen" - When your computer, table, phone or other device quits working, having a backup can save the day.
When your systems are compromised by a cyber-attack or failed update, having backup systems can save the day.

Back It Up
my blog - Back It Up

US-CERT Data Backup Options
US-CERT - Data Backup Options pdf

NIST/NCC0E MSP Protecting Data Extended
NIST/NCC0E - MSP Protecting Data Extended pdf


Social Engineering


CISA - What is Social Engineering & How Does it Work web

WI-Fi

Using a VPN service can help protect you from hackers by hiding your location and encrypt data.

Use VPN "Pull the Shades Down"
NCA - VPN Pull the Shades Down web

Protect your home Wi-Fi network
How to Secure Your Home Wi-Fi
Your router has a default user name and password. If it is not changed, there are lists of default passwords on the Internet.
FTC - Secure Your Wi-Fi Network web

Tech Support Scams

Federal Trade Commission advice "How to Spot, Avoid and Report Tech Support Scams"
FTC - Avoid Tech Support Scams web

MULTI-LAYER TECH SUPPORT SCAM - Highly Organized Scammers
FBI/ic3 - Phantom Hacker web

  • Phantom Hacker 1
    claims to be tech support
  • Phantom Hacker 2
    claims to be financial institution
  • Phantom Hacker 3
    claims to be US Gov Official


Social Media

Social Media Poster
Social Media Poster

Take Back Control of a Social Media Account
HAS Links to Facebook, YouTube, Google, WhatsApp, Instagram, TikTok, LinkedIn, SnapChat, Reddit, Pinterest, X (Twitter), Discord, Blue Sky, Mastodon
NCA - Take Control of Social Media web

That Hard to find 'Report Compromised Facebook Account' page
FB - Report Hacked Facebook Account web

Facebook Help Center
Hacked and Fake Accounts (Hacked and Impersonation on Facebook)
FB - Facebook Help web

SENIORS & Elders

"Phantom Hacker"
is a MULTI-LAYER TECH SUPPORT SCAM
Highly Organized, Highly Proficient

  • phase 1 Tech Support IMPOSTER
  • phase 2 Financial Institution IMPOSTER
  • phase 3 US Gov Official IMPOSTER
FBI/ic3 Phantom Hacker Public Service Announcement
FBI/ic3 - Phantom Hacker web


The FBI tracks cybercrimes .. Persons over 60 reported over Three Trillion dollars lost to cybercriminals in 2023.
FBI/ic3 - 2023 Elder Fraud Report pdf

Increase of Tech Support Scams targeting Older Adults
FBI/ic3 - Increase in Tech Support Scam webs

Elder_Fraud_Tri-fold
NCA - Elder Fraud Tri-fold pdf

Children, Students and Families

Tip Sheet for Parents to Help Children Use Technology Safely
CISA - Secure-Our-World-Raising-Digital-Citizens-Tip-Sheet pdf
Stop Bullying
Stop Bullying . gov website
U.S. Department of Justice Bulletin - Internet Crimes Against Children
DOJ/OVC - Internet Crimes Against Children web

Atrificial Intellegence

Secure-Our-World-Using-AI-Tip-Sheet
CISA - Secure-Our-World-Using-AI-Tip-Sheet pdf

Workplace Security & Training

Cybersecurity Training Guide
CISA - Cybersecurity Training Guide pdf (booK)
NIST Business Quick Start Guide
NIST - Business Quick Start Guide pdf

Travel Tip Sheet

CISA Be Cyber-Smart while Travel Tip Sheet
CISA Travel Tip Sheet pdf

Puzzels and Games

Fun Ways to Learn about Cybersecurity
Cybersecurity-Awareness-Month-2024-Puzzles
NCA - 2004 Cybersecurity Puzzels pdf
CISA Cybersecurity Games
CISA Cybersecurity Games web

How to Get Involved

How to Get Involved in Cybersecurity Awareness Month
NCA - How to Get Involved in CAM pdf
Teach Others - Advocate Tip Sheet
NCA - Teach Others - Advocate Tip Sheet pdf
2004 CAM Toolkit Guide
NCA - 2004 CAM Toolkit Guide pdf
Cybersecurity Video Library
Cybersecurity Video Library
My Blog Articles