Cyber Security Resilience
Cyberspace and its infrastructure are vulnerable to a wide range of risk from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money as well as develop capabilities to disrupt, destroy, or threaten the delivery of essential services. Many crimes that required a physical capability to perpetrate are now able to be carried out through cyberspace. This includes child exploitation, conspiracies, bank and financial fraud, intellectual property violations, and other crimes that can have substantial harm. Improving cybersecurity is key for infrastructure resilience.
- What can you do
- Ensure software is up to date for your systems
- Create strong passwords of eight or more characters with a combination of upper/lowercase, numbers, and special characters
- Run routine scans for virus
- If you find a problem, disconnect from the internet and conduct a full system restore
- Disconnect when not in use. Remove computer, gaming device, or tablet from the internet.
- If at work, or on CWU technology, call IT department immediately
- If at a public place, inform librarian, teacher, or manager immediately
- Identity theft
- Protect passwords for computers and cellphones
- Do not share passwords, personal information online such as full name, birthday
- Ensure proper privacy settings on social networking sites
- Do not write down passwords
- Fraud and phishing
These attacks may be used through email in an attempt to get a user to reveal personal or confidential information that the scammer can use. This may take form as a website designed to look authentic or a personalized email.
- Turn off option to automatically download attachments
- Saving and scanning any attachments before opening them
- Before providing information, call and verify the source that they are indeed the ones who sent the email
- Without clicking, use your mouse to hover over an attached website link to see the full address
- Cyber bullying
Cyber bullying and poor ethics are threats that young adults face from strangers and their peers. Posts online about another person can spread virally, resulting in serious, unwarranted damage to an individuals reputation or personal well-being.
What to do:
If being bullied, tell a trusted teacher, neighbor, parent, or staff
- Cyber predators
Cyber predators search online for other people in order to use, control, or harm them in some way. These predators tend to target teens and young adults, both male and female, on a regular basis regardless if the individual is over 18 years old. Social networking sites have enhanced a predator to target your individuals, especially if they share personal information on their profile.
Protect yourself by:
- Being aware, you never know who is behind the screen, so be protective of yourself and your personal information
- If you are being targeted or harassed online, notify your family and/or the proper authorities