Nearly every aspect of our daily lives connects virtual networks. These networks power our homes, automobiles, offices, and schools.

This leads to great exposure and potential for disruption, interference, or illicit activity. We all need to take an active role in our cybersecurity. Our community needs a reliable, resilient, safe, and trusted cyberspace.


Check out the Indiana Cybersecurity Hub for resources to stay informed and safe online.

Get cybersecurity safety resources from the National Cybersecurity Alliance.

From the US Department of Homeland Security (US DHS)

Learn about the US DHS Cyber and Infrastructure Security Agency (CISA), which provides information to secure our hometown.

Visit the US DHS cybersecurity awareness page (Stop. Think. Connect.) for general online safety tips. 

Find out about the US DHS Computer Emergency Readiness Team (US-CERT) from CISA.

Learn CISA’s strategies to understand computer viruses and protect your home and business network.

Cybersecurity Tips

By learning computer security essentials and taking a few simple steps, each of us will:

  • improve the security of Indiana’s information infrastructure and economy
  • ensure our personal and/or our organization’s safety
  • protect important information

Read this Cyber Security Fact Sheet (pdf) to protect yourself and your loved ones from cybercrime.
Read this Cyber Security Fact Sheet for the Work Place (pdf) to protect workplace computers from unauthorized access or attack.

Create strong passwords that you can remember

  • Use at least 8 characters
  • Combine uppercase and lowercase letters, numbers, and punctuation.
  • Use words typically not found in a dictionary.
  • Add emoticons to make a password more memorable and stronger.
  • Do not use the same username and password on many websites. Hackers can find that information and access your accounts on many other sites.

Use security software tools

  • Anti-virus software can detect and remove viruses from computers. Configure your anti-virus program to perform a full scan every week. Configure the “automatic update” settings to keep the program up-to-date and functional.
  • Install a firewall. Firewalls control the flow of information between your computer and the Internet. Information entering or exiting your computer has to meet the “safety rules.” Otherwise, the firewall blocks that information and prevents any transfer of harmful materials. For tips on how to install a firewall, contact your Internet service provider.

Do not open unsolicited or unknown emails

  • The sender of these emails often wants the recipient to click a link. This link will install malevolent software (malware) onto the computer.
  • The email may use a provocative subject line, a well-known company's logo, or an acquaintance's return address.
  • If from a company, verify the email address before opening any links or attachments.
  • If an email requires you to click on a link or open an attachment, make sure your antivirus software is up to date.
  • Save files to the hard drive, scan them with the antivirus software, and then open the file.

Know who you are dealing with online

  • Never run a program unless you know it is from a person or company you trust. Do not send programs of unknown origin to others.
  • Be alert when file-sharing. File-sharing is often used to download music, games, and software. It uses an informal network of computers with millions of users who run the same software. Always check that the program’s privacy settings don't allow others to access your hard drive You may also unwillingly download pornography or copyrighted material labeled as something else.

Keep your web browsers & operating system up to date

  • Your system will release software patches and updates when it discovers vulnerabilities. Some companies release updates at a consistent time each month. Be alert and check for available updates to your software and operating system.

Back up important files

  • Use a flash or zip drive to back up any important files or information you have on your computer. Software backup tools are also available.

Be cautious when shopping online

  • Use only well-known sites. Check that they are secure and authenticated before purchasing an item.
  • If the price for the item you’d like to buy is severely undervalued, it is likely fraudulent.
  • If you are on an auction site, lose an auction, and the seller contacts you later saying the original bidder fell through, the situation is likely a scam.
  • If looking for a car, research car dealerships. Determine that the dealership is real and how long it has been in business.