Cross Browser Compatible Drop Down Menu - HTML & CSS | handyHTML.com - Web Design Snippets, Tutorials and Resources

Preparing Yourself

    Backing-up Music, Photographs, Financial, Other Important Files
      Even a secure computer can fail, causing you to lose all of your documents, family photos, music and anything else you've stored electronically. If you follow a few simple tips and make it a habit to regularly back up all critical information on your computer, you can protect yourself from computer disasters.   
          

      The Multi-State Information Sharing and Analysis Center (MS-ISAC) provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between and among the states, territories and with local government.

      Backing up music in iTunes       

    Firewalls     

      This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of “always-on” or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem).      

    Passwords

      Your online accounts, computer files, and personal information are more secure when you use strong passwords to help protect them. Test how secure your passwords are using Microsoft's Online Safety password checker.      

    Shopping Safe On-Line

      As more consumers begin to do their shopping on-line it is important that they keep in mind that there are risks involved with internet shopping. Shopping on the Internet is no less safe than shopping in a store or by mail. Any time a consumer makes a purchase they can be taken advantage of by an unscrupulous merchant. The Office of the Illinois Attorney General wants consumers to be aware of the possible pitfalls of on-line shopping. The best way to protect yourself is to know the businesses that you are dealing with and find out policies for returns and refunds. The following tips will help any shopper become cyber-savvy and protect them from the down side of internet buying.       

    Social Networks, Online Gaming, and Mobile Devices

    Software/Driver Updates

      Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information. Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.

    Vishing

      Vishing is the criminal practice of using social engineering over the telephone system, most often using features facilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing. Vishing exploits the public's trust in landline telephone services.       

    Wireless or WiFi Hotspots

      Wireless or "WiFi" Internet hotspots provide convenience and flexibility for Internet users. As WiFi hotspots and notebook computers have become prevalent, it's easy to work where you want, when you want. As with all technologies, WiFi hotspots come with risks. If you follow the appropriate precautions, you can take advantage of all the benefits of WiFi, while limiting your exposure to danger.      

 

If You Are Attacked


 

How To Recover

    What to Do If You Think You’ve Been Hacked:
      Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviors.      

         Loss or Destruction of Important Files

      Even a secure computer can fail, causing you to lose all of your documents, family photos, music and anything else you've stored electronically. If you follow a few simple tips and make it a habit to regularly back up all critical information on your computer, you can protect yourself from computer disasters.      

      The Multi-State Information Sharing and Analysis Center (MS-ISAC) provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between and among the states, territories and with local government.


 

Mitigation


(US-CERT)
US Computer Emergency
Readiness Team Home Cyber Security Alerts