Cyber-attack security

Helpful tips and safe tricks

By 97th Communications Squadron on January 30, 2020

While cyber-attacks are always happening and tensions are on the rise, everyone needs to keep in mind the best practices to counteract these types of measures in their daily duties. Individuals frequently tell themselves, "it can't happen to me." However, statistically, this is not the case. Below are a few ways users can minimize their own vulnerability from phishing or spam emails, which is one of those most common methods of compromise:

Before clicking links inside emails, be sure to check the grammar. Not all hackers are bilingual and may rely on services such as Google Translate to generate their message. Did you expect an email? Hackers are not your friends and as such do not know how they act. If your friend is sending you abnormal messages with links, give them a call to verify it is actually them rather than a hacker who has compromised their account. Is the email from somebody you know? Emails from strangers telling you that you won a new iPad, from a contest you did not enter, are HIGHLY likely to be false. If you are convinced you really did win an iPad, give them a call first. A legitimate business will provide their contact information at the end of the email.

What are Data Breaches and How Can You Protect Your Identity?

identityprotectionreview.com/articles/what-are-data-breaches-and-how-can-you-protect-your-identity

With technology speedily advancing day by day, widening the door of convenience, the Internet has fast-become part of our daily lives. However, while cyber security frequently improves and public awareness of online safety grows, the Internet retains its dark side. Cyber criminals are out there, preying on billions of Internet users by planting traps and exploiting system vulnerabilities

How to Protect Your Identity on Social Media

identityprotectionreview.com/articles/how-to-protect-your-identity-on-social-media

For most of us, not a day goes by where we don't use our favorite social media platforms, connecting with friends, family, groups and work colleagues. Facebook, Twitter, Instagram and LinkedIn users collectively create a gargantuan worldwide online social scene. And every user has one major thing in common: They, like you, share tons of information.

Phishing, Phone and Email Scams: How to Keep Your Identity Protected

identityprotectionreview.com/articles/phishing-phone-and-email-scams-how-to-keep-your-identity-protected

Modern life has afforded us unprecedented conveniences. But it's also opened the door to deceptive criminality schemes which frequent global headlines. Fraudsters can attack both off and online, hiding behind the façade of phony emails, letters, telephone calls, text messages and emails.

Why is Credit Monitoring Important?

identityprotectionreview.com/articles/why-is-credit-monitoring-important

In today's world, having control of your credit can help you to save both time and money. Not only can credit monitoring be a personal assistant to you, but also a watchdog. It watches your credit reports and will alert you with any changes to any of your accounts. This will both help you stay secure and also maintain a healthy credit score.

These simple steps may not stop all cyber-attacks, but they will help insulate individuals from email-based attack; which amounts to roughly 91 percent of all cyber-attacks. For more information concerning this topic, please contact the Altus Communication Focal Point at 580.481.5341.