{"id":179441,"date":"2018-09-26T19:28:09","date_gmt":"2018-09-27T00:28:09","guid":{"rendered":"https:\/\/www.ntegrait.com\/did-you-know-that-october-is-national-cybersecurity-awareness-month\/"},"modified":"2018-09-26T19:28:09","modified_gmt":"2018-09-27T00:28:09","slug":"did-you-know-that-october-is-national-cybersecurity-awareness-month","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/did-you-know-that-october-is-national-cybersecurity-awareness-month\/","title":{"rendered":"Did You Know That October Is National Cybersecurity Awareness Month?"},"content":{"rendered":"
[youtube https:\/\/www.youtube.com\/watch?v=EuZ206e_wRA&w=560&h=349]<\/p>\n
Online security is something that should get everyone\u2019s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There\u2019s so much you need to know to keep your personal and business information safe.<\/p>\n
[youtube https:\/\/www.youtube.com\/watch?v=EuZ206e_wRA]\u00a0<\/p>\n
But\u2026 where do you start? <\/strong><\/p>\n As trusted cybersecurity professionals, we want to help you get educated and stay informed. That\u2019s why during National Cybersecurity Awareness Month our goal is to give you all the information you need to stay secure.<\/p>\n How can we help?<\/strong><\/p>\n We\u2019ll be sharing valuable and timely information on cybersecurity in blogs, in our newsletter, and on all of your favorite social media sites.<\/p>\n What should you do?<\/strong><\/p>\n You can also give us a call for personalized solutions by subscribing to our exclusive mailing list.<\/p>\n Being\u00a0cybersecurity aware means\u00a0that you understand what the threats are and take precautions to prevent them.<\/p>\n Here are some important reminders:<\/p>\n What else should you watch out for?<\/strong><\/p>\n Malicious Emails<\/strong> \u2013 These typically come in the form of a request from a trustworthy organization like a financial institution.<\/p>\n The email may urge you to act quickly, saying that your account has been compromised or a request can\u2019t be fulfilled. The purpose of the email is to get you to provide confidential information to rob you of your money or identity credentials.<\/p>\n Take precautions and contact the company directly to see if the email is legitimate.<\/p>\n When you search for the company, don\u2019t use any information in the message. Perform your own search online.<\/p>\n Ransomware <\/strong>\u2013 This is a type of malware that accesses your files and locks (encrypts) then demands payment to unlock them.<\/p>\n It\u2019s not suggested that you pay the ransom as this is not a guarantee that you\u2019ll get your files back.<\/p>\n Hopefully, you have a secure, offsite copy of all your files so you can recover your data.<\/p>\n Viruses<\/strong> \u2013 These are harmful computer programs that can be transmitted from device to device.<\/p>\n Viruses operate in different ways but they are all designed to create havoc, and some provide criminals access to data on infected devices.<\/p>\n If your computer acts irregularly, report this to your supervisor right away. This could be caused by a virus.<\/p>\n Spyware<\/strong> \u2013 Spyware downloads onto your devices without your permission when you visit an unsafe website or click on a malicious attachment.<\/p>\n It can make your computer do things like open advertisements or even track your online movements.<\/p>\n Botnets <\/strong>\u2013 These are networks of computers that get infected by malware. The criminals can remotely control these botnets to gain confidential or financial information or launch an attack on your network.<\/p>\n Spam<\/strong> \u2013 This is like getting junk mail but by email. These are unsolicited and unwanted.<\/p>\n Phishing <\/strong>\u2013 This is where a criminal sends an email that contains a malicious link to collect personal or financial data or to infect your computer with malware and viruses.<\/p>\n Spear phishing is where the criminal uses attacks against specific targets to collect information to gain access to IT systems or a list of customers.<\/p>\n Spam and phishing messages aren\u2019t limited to email. They also appear on social media sites and in text messages. Think before you act and adopt the motto: \u201cWhen in doubt, throw it out!\u201d<\/p>\n What to do if you become a victim of cybercrime?<\/strong><\/p>\n Need more help?<\/strong><\/p>\n We\u2019re here for you.<\/p>\n These are just some of the protections and service we can offer:<\/p>\n <\/p>\n We hope this helps. Remember, we\u2019ll be posting timely cybersecurity information for you in our Blogs, newsletters and more. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" [youtube https:\/\/www.youtube.com\/watch?v=EuZ206e_wRA&w=560&h=349] Online security is something that should get everyone\u2019s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There\u2019s so much you need to know to keep your personal and business information safe. [youtube https:\/\/www.youtube.com\/watch?v=EuZ206e_wRA]\u00a0 But\u2026 where do you start? As trusted cybersecurity professionals, we want to help you…<\/p>\n","protected":false},"author":5,"featured_media":158960,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[65],"class_list":["post-179441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-mediabytes"],"acf":[],"yoast_head":"\n\n
\n
\n