Cyber Security Considerations

Share & Bookmark, Press Enter to show all options, press Tab go to next option
Print

Cecil County’s Information Technology Department would like to share 10 Cyber Security Tips to help keep your computers/Mobile devices and your personal data safe. These tips have been provided to aid Cecil County Government customers, employees and visitors stay better protected from Cyber Criminals.

Personal/Business Cyber Security Tips

  1. Use & keep updated Anti-Virus (AV) & Anti-Malware (AM) Protection

     Anti-virus (AV) & Anti-Malware (AM) protection software has been the most prevalent solution to fight malicious attacks on your Computer and Mobile Devices. This software protects from malicious code from entering your device and compromising your data. Use anti-virus software from trusted vendors and only run one AV tool on your device. There are many providers of this protection (Norton, McAfee, Avast, among many others), and many come with a subscription to keep the definitions up to date.

  2. Keep your Device Software Up to Date

    As important as having Anti-Virus (AV) and Anti-Malware (AM) running and updated on your devices, keeping the software that is installed on your devices is equally important. The software will have updates that will come directly from the Software Company and these are supplied to protect your devices from attackers that have found a way to make the program(s) easier for them to access your data. Everything that is installed and used on your devices should be routinely updated. These updates are from the operating system to the productivity software that is used.

  3. Use Strong Passwords & Use a Password Management Tool

    Passwords are used in logging in to your device and are routinely used for visiting web sites for your banking, online purchasing, etc… Remembering these passwords can be tough and having to reset them can be a frustrating experience. A Password Manager will aid in this and if you are not using one, you should as it makes everything more secure as your passwords will not be lost or forgotten. There are many Password Managers available, and some come with a onetime only cost or subscription, and some can be stored locally or in the cloud.

    Always use strong passwords and do not use the same one over again. Routinely, there are news reports that attackers have obtained a Company’s user list which will include user names and the associated Passwords. A strong password that is different from site or programs used will limit any exposure of the attacker getting your data and information.

  4. Use Two Factor or Multi-Factor Authentication (MFA) [wherever possible]

    Two-factor or Multi-Factor (MFA) Authentication is a service that adds additional layers of security to the standard password method of online identification. Without two-factor authentication, you would normally enter a username and password. Two-factor authentication requires that you enter one additional authentication method such as a Personal Identification Code, sent to your Mobile Device or email. With multi-factor authentication, you would be prompted to enter more than two additional authentication methods after entering your username and password.

    These steps ensure that your accounts and information cannot be accessed by anyone but you. Cyber Criminals would have to have that additional code in order to gain access to the data that they are after. Most Cyber Criminals give up as soon as they determine the additional code is needed.

  5. Use your Mobile Device (Cell Phone, Tablets, etc.…) Securely

    Mobile devices are a target and attackers have been more creative in trying to target these devices. Here are basic steps that you can take to keep your device and the data that is on it more secure:

    1. Create a difficult Pass-Code – not your Birthdate, Bank Pin, Anniversary, etc…
    2. Install Apps only from Trusted Sources
    3. Update your device – Attackers use weaknesses in Unpatched/Updated devices.
    4. Perform Regular Backups of your device – in the cloud or on your home computer.

  6. Protect Your Sensitive Personal Identifiable Information (PII)    lock symbol
    Personal Identifiable Information (PII) is any information that can be used by a cybercriminal to identify or locate an individual. PII includes information such as name, address, phone numbers, data of birth, Social Security Number, IP address, location details, or any other physical or digital identity data. Only do any online transactions with web sites that use the https address and have the green lock symbol. 

    In the new “always-on” world of social media, you should be very cautious about the information you include online. It is recommended that you control the amount of your sensitive data about yourself on social media. Consider reviewing your privacy settings across all your social media accounts, particularly Facebook. Adding your home address, birthdate, or any other PII information will dramatically increase your risk of your data and information being accessed by Cyber Criminals. Cyber Criminals use this information to their advantage!

  7. Backup Your Data Regularly

    Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two different types of media (local and external hard drive) and one copy in an off-site location (cloud storage).

    If you become a victim of ransomware or malware, the only way to restore your data is to erase your systems and restore with a recently performed backup.

  8. Don’t Use Public Wi-Fi

    Don’t use public Wi-Fi without using a Virtual Private Network (VPN). By using VPN software, the traffic between your device and the VPN server is encrypted. This means it’s much more difficult for a cybercriminal to obtain access to your data on your device. Use your cell network if you don’t have a VPN when security is important.

  9. Review Your Online Accounts & Credit Reports Regularly for Changes

    The news reports on companies having its confidential customer data accessed is constantly increasing. Protecting your data is more important than ever. Consumers need to safeguard their online accounts and monitor their credit reports. A credit freeze is the most effective way for you to protect your personal credit information from cyber criminals right now. Essentially, it allows you to lock your credit and use a personal identification number (PIN) that only you will know. You can then use this PIN when you need to apply for credit.

  10. Do not use Mobile Device Charging Stations in Airports or Malls
    Summer Travel Season is approaching, and Cecil County Information Technology Department would like to pass along a Consumer Warning received from the FBI. The FBI has recommended that consumers/travelers do not use Public Phone Charging Stations as bad actors/attackers can spread Malware/Viruses or Monitoring software onto Cell phones/Mobile Devices. Plugging your phone/Mobile devices into an Airport, Mall or other public location Phone Charging Stations can expose your Phone/Mobile Device and the data that is on it to the attackers.

    FBI and Cecil County Information Technology Department recommends when traveling carry/use your own Charger and USB Cords and plugging into an electrical outlet. It has been found that Criminals/Attackers will purposely leave plugged in USB Cables or will give Phone USB Cables as a gift which were found to have been compromised.

            Keep yourself and your Cell Phones/Mobile Devices safe out there.