Skip to content

Tuesday October 15, 2019 Salt Lake City, UT

Cyber Security

TOP STORY

Inside DPS

Protecting Utah

October is National Cybersecurity Awareness Month

Tuesday October 1, 2019
Image shows text promoting National Cybersecurity Awareness Month. "Own it, Secure it, protect it, October 2019 National Cybersecurity Awareness Month #BeCyberSmart"

The line between our online and offline lives is indistinguishable. In these tech-fueled times, our homes, societal well-being, economic prosperity and nation’s security are impacted by the internet.

Under the overarching theme of  ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month (NCSAM) is focused on encouraging personal accountability and proactive behavior in security best practices, digital privacy and draw attention to careers in cybersecurity. NCSAM 2019 will address the following online safety messages and identify opportunities for behavioral change:

  • Own IT.
    • Never Click and Tell: staying safe on social media
    • Update Privacy Settings
    • Keep Tabs on Your Apps: best practices for device applications
  • Secure IT.
    • Shake Up Your Passphrase Protocol: create strong, unique passphrases
    • Double Your Login Protection: turn on multi-factor authentication
    • Shop Safe Online
    • Play Hard To Get With Strangers: how to spot and avoid phish
  • Protect IT.
    • If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems
    • Stay Protected While Connected: Wi-Fi safety
    • If You Collect It, Protect It: keeping customer/consumer data and information safe

OWN IT

Never Click and Tell

  • Cybercriminals love it when you overshare on social media – they can
    learn all about you! Be CyberSmart and make it harder for them by
    avoiding posting real names, places you frequent and home, school and work locations.
Image shows a woman's hand holding a cell phone with animated hearts floating in the air above it. Text reads "Never click and tell. Cybercriminals love when you share personal information on social media."

Update Privacy Settings

  • Your personal information is like money. Be CyberSmart about where
    you’re sharing it, who you’re sharing it with and how it’s being used.
Image shows  an older couple in their kitchen with the man sitting at the computer and the woman looking over his shoulder. Text reads: update your privacy settings. Personal information is like money. Value it. Protect it.

Keep Tabs on Your Apps

  • Browsing on your mobile device? Make sure it’s not running suspicious apps or using permissions you didn’t realize you approved.
  • Enable automatic app updates in your device settings so your software runs smoothly and you stay protected against cyberthreats!
  • Rules for Keeping Tabs on Your Apps: 1) Delete apps you don’t need or no longer use. 2) Review app permissions. Say “No” to any that don’t make sense.  3) Only download apps from trusted sources.
Image shows a woman standing on a bridge holding a cell phone. Text reads: Keep tabs on your apps. Apps left unchecked can run riot on your device.

SECURE IT

Shake Up Your Passphrase Protocol

  • When it comes to passphrases, it best to mix it up and stay unique! Keep them fun, easy-to-remember and don’t reuse them.
  • P@s$w0rds_d0n’t_hav3_2_b_th!s_Complic@teD! Seriously, who can remember that? Make your password a passphrase. Keep it fun and friendly, just like this!  
Image shows a mom, dad and two kids sitting on a couch holding a tablet. Text reads share up your passphrase protocol. Keep passphrase fund and unique.

Double Your Login Protection

  • Sometimes even long and strong passphrases aren’t enough. Step up your game with multi-factor authentication and keep all your private bits…private.
  • No matter how long and strong your passphrase is, a breach is always possible. Make it harder for cybercriminals to access your account by enabling multi-factor authentication.
Image shows a man with glasses sitting at a keyboard typing. Text reads double your login protection. Enable multi-factor authentication for extra account security.

Play Hard to Get With Strangers

  • Cybercriminals cast wide nets with phishing tactics, hoping to drag in victims. They may offer a financial reward, threaten you if you don’t engage, or claim that someone is in need of help.
  • If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments.
Image shows a fish hook with a card attached to it with text asking to enter your login information. Text reads play hard to get with strangers. Don't get hooked! If you're unsure who an email or message is from, delele it.

PROTECT IT

If You Connect, You Must Protect

  • If you connect, you must protect. Outsmart cyberthreats by keeping your device operating systems and software up to date.
  • Any device that connects to the internet is vulnerable to various risks. The best defense is to keep device security software, web browser and operating systems up to date. Be CyberSmart by turning on auto-updates.
Image shows a mom, dad and daughter sitting at a table in a kitchen all looking at a lap top screen. Text reads If you connect you must protect. Keep All Your online devices and software up to date.

Stay Protected While Connected

  • Stay protected while connected. Public Wi-Fi networks are not secure – limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services.
  • Public Wi-Fi is not secure or safe. If you must connect, consider using a virtual private network (VPN) or a personal/mobile hotspot.
Image shows young woman in an airport terminal with her lap top open on her lap and she's looking out the window. Text reads stay protected while connected. Public WiFi is not secure and can put your device and data at risk.

If You Collect It, Protect It

  • If You Collect It, Protect It. Any data your business collects, including customer and employee information, must be safely stored and protected.
  • Limit access to customer data to only the employees who require it to perform core duties of their jobs.
Image shows a hand holding a cell phone that is equipped with a square style payment system and swiping a credit card through the square device. Text reads if you collect it, protect it. Keep all your business data, including customer and employee information, stored safely.

SHARE THIS STORY

More from the News Room

Utah’s New Lane Filtering Law

May 2019

Fatal Crash on SR-9 MM 1.2

October 2019

State Fire Marshal’s Office Life Safety Trailers Hit the Road for Education

October 2019

POST Introduction to K9 Class Featuring Nomos, Onyx and Kuli

October 2019