Cybersecurity | Ready.gov (2024)

Protect YourselfDuring an AttackAfter an AttackAdditional Resources

Cyberattacks are malicious attempts to access or damage a computer or network system. Cyberattacks can lead to the loss of money or the theft of personal, financial and medical information. These attacks can damage your reputation and safety.

Cybersecurity involves preventing, detecting and responding to those cyberattacks that can have wide-ranging effects on individuals, organizations, the community and the nation.

Cybersecurity | Ready.gov (1)

Cyberattacks can occur in many ways, including:

  • Accessing your personal computers, mobile phones, gaming systems and other internet- and Bluetooth-connected devices.
  • Damaging your financial security, including identity theft.
  • Blocking your access or deleting your personal information and accounts.
  • Complicating your employment or business services.
  • Impacting transportation and the power grid.

Protect Yourself Against Cyberattacks

Cybersecurity | Ready.gov (2)

You can avoid cyber risks by taking steps in advance:

Image

Cybersecurity | Ready.gov (3)

  • Limit the personal information you share online. Change privacy settings and do not use location features.
  • Keep software applications and operating systems up-to-date.
  • Create strong passwords by using upper and lower case letters, numbers and special characters. Use a password manager and two methods of verification.
  • Watch for suspicious activity that asks you to do something right away, offers something that sounds too good to be true, or needs your personal information. Think before you click. When in doubt, do NOT click.
  • Protect your home and/or business using a secure Internet connection and Wi-Fi network, and change passwords regularly.
  • Don’t share PINs or passwords. Use devices that use biometric scans when possible (e.g. fingerprint scanner or facial recognition).
  • Check your account statements and credit reports regularly.
  • Be cautious about sharing personal financial information, such as your bank account number, Social Security number or credit card number. Only share personal information on secure sites that begin with https://. Do not use sites with invalid certificates. Use a Virtual Private Network (VPN) that creates a more secure connection.
  • Use antivirus and anti-malware solutions, and firewalls to block threats.
  • Back up your files regularly in an encrypted file or encrypted file storage device.
  • Do not click on links in texts or emails from people you don’t know. Scammers can create fake links to websites.
  • Remember that the government will not call, text or contact you via social media about owing money.
  • Keep in mind that scammers may try to take advantage of financial fears by calling with work-from-home-opportunities, debt consolidation offers and student loan repayment plans.

During a Cyberattack

  • Check your credit card and bank statements for unrecognizable charges.
  • Check your credit reports for any new accounts or loans you didn’t open.
  • Be alert for emails and social media users that ask for private information.
  • If you notice strange activity, limit the damage by changing all of your internet account passwords immediately.
  • Consider turning off the device that has been affected. Take it to a professional to scan for potential viruses and remove any that they find. Remember: A company will not call you and ask for control of your computer to fix it. This is a common scam.
  • Let work, school or other system owners know what happened.
  • Run a security scan on your device to make sure your system is not infected or acting more slowly or inefficiently.
  • If you find a problem, disconnect your device from the Internet and perform a full system restore.

After a Cyberattack

Cybersecurity | Ready.gov (4)

Let the proper federal, state and local authorities know if you believe you have been a victim of a cyberattack.

  • Contact banks, credit card companies and other financial services companies where you hold accounts. You may need to place holds on accounts that have been attacked. Close any unauthorized credit or charge accounts. Report that someone may be using your identity.
  • File a report with theOffice of the Inspector General (OIG)if you think someone is using your Social Security number illegally.
  • File a complaint with theFBI Internet Crime Complaint Center (IC3). They will review the complaint and refer it to the appropriate agency.
  • File a report with the local police so there is an official record of the incident.
  • Report identity theft to theFederal Trade Commission.
  • Contact the Federal Trade Commission (FTC) atftc.gov/complaintif you receive messages from anyone claiming to be a government agent.
  • Contact additional agencies depending on what information was stolen. Examples include contacting:
    • TheSocial Security Administration(800-269- 0271) if your Social Security number was compromised, or
    • The Department of Motor Vehicles if your driver's license or car registration has been stolen.
  • Report online crime or fraud to your local United States Secret Service (USSS)Electronic Crimes Task Forceor theInternet Crime Complaint Center.

Additional Resources

Cybersecurity | Ready.gov (2024)

References

Top Articles
Preet Beauties Naperville Il
Bj타리
Funny Roblox Id Codes 2023
Calvert Er Wait Time
Global Foods Trading GmbH, Biebesheim a. Rhein
jazmen00 x & jazmen00 mega| Discover
Chris Provost Daughter Addie
Frank Lloyd Wright, born 150 years ago, still fascinates
T Mobile Rival Crossword Clue
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
2013 Chevy Cruze Coolant Hose Diagram
Craigslist Chautauqua Ny
Morocco Forum Tripadvisor
Binghamton Ny Cars Craigslist
Cbs Trade Value Chart Fantasy Football
Bowlero (BOWL) Earnings Date and Reports 2024
2021 Lexus IS for sale - Richardson, TX - craigslist
Mzinchaleft
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Qhc Learning
Okc Body Rub
How To Tighten Lug Nuts Properly (Torque Specs) | TireGrades
Firefly Festival Logan Iowa
27 Fantastic Things to do in Lynchburg, Virginia - Happy To Be Virginia
United E Gift Card
Pdx Weather Noaa
Urban Blight Crossword Clue
Www.craigslist.com Syracuse Ny
Black Adam Showtimes Near Amc Deptford 8
Blue Beetle Movie Tickets and Showtimes Near Me | Regal
Magicseaweed Capitola
877-292-0545
Frommer's Philadelphia &amp; the Amish Country (2007) (Frommer's Complete) - PDF Free Download
301 Priest Dr, KILLEEN, TX 76541 - HAR.com
Easy Pigs in a Blanket Recipe - Emmandi's Kitchen
Vocabulary Workshop Level B Unit 13 Choosing The Right Word
Simnet Jwu
Tripadvisor Vancouver Restaurants
Unblocked Games Gun Games
Cabarrus County School Calendar 2024
Tlc Africa Deaths 2021
Sandra Sancc
Booknet.com Contract Marriage 2
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
Mountainstar Mychart Login
Oefenpakket & Hoorcolleges Diagnostiek | WorldSupporter
Colin Donnell Lpsg
Wrentham Outlets Hours Sunday
Sam's Club Fountain Valley Gas Prices
M Life Insider
Cheryl Mchenry Retirement
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 5617

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.