skip to content
Keyboard

News

Cybersecurity and You

Defining What it Means to be Cyber-secure

10/17/2019 11:05:57 AM

A hacker on the the screen of one laptop reaching for data with a fishing rod from the screen of another laptop.

When it comes to cybersecurity, knowledge is power. The more you understand how your digital profile can impact your ability to keep data secure, the better off you will be. The more you understand the tactics that cyber criminals use to access your information, the better you can protect yourself. We’ve broken down a few key terms that you should know to be more secure.

Cybersecurity is everyone’s responsibility. Take responsibility for your data and be better prepared!

Protection

Firewall

A firewall is a defensive technology that is focused on keeping out cyber criminals. It acts as a barrier that protects from internal and external cyber-attacks. A firewall can be a software utility, or a hardware device.

Internet of Things (IoT)

Any object or device that is connected to the internet. The rapidly expanding number of “things,” which can send and receive data, includes cars, appliances, smartwatches, lighting, home assistants, home security, and more.

Multi-Factor Authentication (MFA)

MFA is a security process that requires more than one method of authentication to verify your identity. One of the most common methods of MFA is to log in using a username and password. Then, a one-time code will be generated and sent to your phone or email, which you need to enter within a certain amount of time. The unique code is the second factor for multi-factor authentication.

Other methods used for multi-factor authentication could include a security token, a fingerprint, facial recognition, or even voice recognition.

Open WIFI

Open WIFI networks are unencrypted, meaning that anyone can create a fake hotspot and trick your device into joining automatically. When you use an open Wi-Fi, your passwords and personal data are at risk for attack. Always check with an establishment for legitimate Wi-Fi networks before connecting, and when in doubt, use your phone’s hotspot.

Passphrase

A passphrase is a combination of words and characters that can be much easier to remember than a traditional password. For example, a passphrase “LivingtheDre@m!” might stick in your head better than the password “L$rvx7ms.”

Cyber Attacks

Botnet

Botnet is a collection of private computers that are connected to the internet, infected with malware, and then controlled as a group by an unauthorized person without the owners’ knowledge. Botnets are used for nefarious purposes, like sending spam emails. Almost any device connected to the internet can be infected and pulled into a botnet without its owner noticing.

Distributed Denial of Service (DDoS)

A DDoS attack is where an attacker tries to make an online service or website unreachable to legitimate users by flooding it with unwanted requests from multiple computers. Similar to a crowd of people blocking the entry of a store, making it harder to shop, DDoS attacks make it hard for any legitimate business to occur.

Malware

Malware is software that is designed to disrupt, damage or gain unauthorized access to a computer system or application. Viruses, trojans, spyware, and ransomware are some of the different kinds of malware that you may encounter. Malware can occur when a person falls victim to a phishing scam.

Phishing

Phishing is a scam where a cyber criminal uses fake email, social media, phone calls, voicemails or texts that look like they are from a reputable source. The goal is to trick you into revealing sensitive information like password or credit card numbers. They sometimes contain attachments that infect your computer, and often contain links to fake websites that capture the information you enter.

Ransomware

Ransomware is a type of malware that will make your computer files inaccessible unless you pay an online ransom to regain access to them. Ransomware has impacted cities and state governments across the country. Most recently, a ransomware attack hit 22 towns in Texas, and attackers asked for $2.5 million to unlock files that were critical to deliver services to citizens.

Cybersecurity

back to top