Cybersecurity

We are connected in our daily lives. Our leisure, our personal finances, our economy and our hometown security depends on a stable, trusted, reliable, safe and resilient cyberspace. We use these networks to communicate, travel, power our homes, automobile, offices, schools – just about everything we do – we do connected. Being connected also means more exposure and the potential for disruption, interference or illicit activity. We all need to take an active role in our own Cybersecurity.

Resources

Check out the Indiana Cybersecurity Hub for resources to stay informed and safe online.

Get cybersecurity safety resources from the National Cybersecurity Alliance.

From the US Department of Homeland Security (US DHS)

Learn about the US DHS Cyber and Infrastructure Security Agency (CISA), which provides individuals, businesses and local governments with relative, timely and actionable information needed to keep our hometown resources secure.

Visit the US DHS cybersecurity awareness page (Stop. Think. Connect.) for general on-line safety tips. 

Find out about US DHS Computer Emergency Readiness Team (US-CERT) from CISA, which leads efforts to improve the nation's cybersecurity posture, coordinates cyber information sharing, and proactively manages cyber risks to the Nation while protecting the constitutional rights of Americans.

Learn ways to improve the security of your new computer, understand the basics about computer viruses, and discover way to improve the security of your home and business network from CISA

Cybersecurity Tips

Maintaining the security of cyberspace is a shared responsibility in which each of us plays a critical role. Awareness of computer security essentials will improve the security of Indiana’s information infrastructure and economy. By taking a few simple steps, individuals and organizations can help ensure their safety and security, and protect important information like financial documents, health records, photos, and more.

Read this Cyber Security Fact Sheet (pdf) to help protect yourself and your loved ones from cybercrime.
Read this Cyber Security Fact Sheet for the Work Place (pdf) to help protect computer systems in the workplace against unauthorized access or attack.

Use strong passwords

  • All passwords should be the strongest you can use and remember.
  • Strong passwords are at least 8 characters long and use combinations of uppercase and lowercase letters, numbers, and punctuation.
  • Strong passwords contain words typically not found in a dictionary.
  • Adding emoticons if possible can make a password more memorable and boost strength.
  • Do not use the same username and password on multiple websites. Hackers can find that information and use it to access your information on many other sites.

Use security software tools

  • Anti-virus software can be used to detect and remove viruses from computers. Configure your anti-virus program to perform a full scan every week, and ensure the “automatic update” settings are configured to keep the program up-to-date and working correctly.
  • Install a firewall. Firewalls control the flow of information between your computer and the Internet. When information coming into or going out of your computer does not meet the “safety rules,” the firewall blocks that information to prevent the transfer of any dangerous or harmful material. For tips on how to install a firewall, contact your Internet service provider.

Do not open unsolicited or unknown emails

  • Often in these emails the senders wants the recipient to click on a link that will install malevolent software, known as malware, onto the computer.
  • The email may have a provocative subject line, logos from a well-known company or use the return address of an acquaintance.
  • If from a company, verify the email address before opening any links or attachments.
  • If clicking on a link or open an attachment in an email is required, make sure antivirus software is up-to-date.
  • Save files to the hard drive, scan them with the antivirus software and then open the file.

Know who you are dealing with online

  • Never run a program unless you know it is from a person or company you trust. Do not send programs of unknown origin to others.
  • Be alert when file-sharing. File-sharing is often used to download music, games, and software through an informal network of computers, and millions of users, running the same software. Without checking the program’s privacy settings, others may be able to gain access to information on your hard drive such as tax information, emails, photos, and other personal documents. You may also unwillingly download pornography or copyrighted material labeled as something else.

Keep your web browsers & operating system up-to-date

  • Patches and updates for software are released when vulnerabilities have been discovered. Some companies release updates at a consistent time each month. Keep an eye out and check for available updates to your software and operating system.

Back up important files

  • Use a flash or zip drive to back up any important files or information you may have on your computer. Software backup tools are also available.

Be cautious when shopping online

  • Be wary if the price for the item you’d like to buy is severely undervalued. If it is, it is likely fraudulent.
  • If you are on an auction site and lose an auction and the seller contacts you later saying the original bidder fell through, the situation is likely a scam.
  • Use only well-known sites, and make sure they are secured and authenticated before purchasing an item.
  • If looking for a car, research car dealerships to determine if they are real and how long they have been in business.