1. Is my password secure enough?
This questions depends on you! Make sure you don't share you password with anyone that you cannot trust. Take precautions not to write down your password anywhere physically or virtually. To check the strength of your password, please visit security.org's password strength checker at https://www.security.org/how-secure-is-my-password/.
2. What are the most common types of cyber attacks?
According to Statista, Phishing and Pharming attacks are the two most common types of cyber attacks, accounting for about 50% of all types of cyber crimes possible. These two types of attacks target the general public more than any other type of attack.
3. What can I do to keep myself as secure as possible?
Simple steps apart from staying attentive to the content you are accessing over the internet include: creating strong passwords, keeping your devices up-to-date, and installing firewalls from trusted companies
4. Who are the main targets of cyber attacks?
While mainly small businesses are targeted for most types of cyber attacks, the most common types of attacks are ones that can affect anyone. Many times, even basic human error, such as mistyping a web link, can cause an attack to occur, so make you take measure to keep yourself secure.
5. What can I lose from a cyber attack?
Any data that you keep on your device can be accessed by a hacker. Nothing should be assumed safe. Passwords, account IDs, credit cards, personal photos, all of your documents would now be at the hands of a hacker.
6. How often does a cyber attack occur?
Studies at Maryland University show that Cybersecurity related attacks occur every 39 seconds. This means about 2.2k attacks a day. This could mean you! So make sure you take precautions in order to successfully avoid any issues.
7. What do I do if I experience a cyber attack
The best course of action is to respond as fast as possible to these attacks. Start by completely cutting off the device from the internet and freezing any accounts that are linked to your bank until you are sure that the hacker is no longer in your system. Once your accounts are no longer accessible from the hacker, contact the FBI field office to report the crime and contact your firewall software company on the next steps to eliminate the threat from your device.
Proudly powered by Weebly