Frequently Asked Question
Only You Can Prevent Data Breaches
Last Updated 4 years ago
For an overview of cybersecurity topics, including what you need to know about data breaches, social media, passwords, email, and mobile devices, see the presentation: Only You Can Prevent Data Breaches
Additional Information:
What you need to know about cybersecurity:
What you need to know about social media:
What you need to know about passwords:
What you need to know about email:
What you need to know about phishing:
What you need to know about mobile devices:
Keywords: cybersecurity, phishing, password, social network, security, Personally Identifiable Information, PII, identity theft
Additional Information:
What you need to know about cybersecurity:
- Best Practices for Staying Safe Online (presentation handout)
- Cyberthreat Real-Time Map (Kaspersky)
- Cyberthreat Real-Time Map (Bitdefender)
- Live Botnet Threats Worldwide
- * Check if your account has been compromised
- Fraudsters deepfake CEO’s voice to trick manager into transferring $243,000 by Ravie Lakshmanan (Sept. 2, 2019)
- 23 towns in Texas were hit by possibly the largest-ever ransomware attack... by Antonio Villas-Boas (Aug. 20, 2019)
- Ransomware hits Louisiana schools... by Lisa Vaas (July 28, 2019)
- Hackers Demand $2 Million From Monroe by Lindsay McKenzie (July 15, 2019)
- Another Hacked Florida City Pays a Ransom, This Time for $460,000 by Patricia Mazzei
(June 27, 2019) - The Baltimore Cyberattack Highlights Hackers' New Tactics by Liz Farmer (May 30, 2019)
- Facebook admits cyber attack may have exposed info from 50 million accounts to hackers by Michael Potuck (Sept. 28, 2018)
- List of Data Breaches (Wikipedia)
- Data Privacy Concerns
- Protect Yourself and Your Identity
- How to Improve Computer Security at Home
- AG Ferguson bill strengthening data breach laws passes legislature
What you need to know about social media:
- Cyber Hygiene (Morgan Stanley)
- How Social Media Networks Facilitate Identity Theft and Fraud
- Social Media: Securing Key Account and Devices
- How to keep your personal information safe on social media
- Staying Safe on Social Networking Sites
- Identity Theft Through Social Networking? Lessons to Take Now!
- How to check if your Facebook data was used by Cambridge Analytica
- List of data breaches
- Facebook failed to warn users of known risks before 2018 breach
- Facebook Help Center - Which banned apps may have had access to my info?
- Creating Google Alerts
- Forbes Magazine - the cost of identity theft
What you need to know about passwords:
- Your Pa$$word doesn’t matter by Alex Weinert
- How Secure Is My Password?
- Password Reuse Abounds, New Survey Shows by Jai Vijayan
- How Can I Keep Track of All of My Passwords
- You Should Be Using a Password Manager by Eric Limer
- The dangers of autocomplete passwords (Jan. 31, 2019)
- Video: What is Two-Factor Authentication? (1:59)
- Two-Factor Authentication: Who Has It and How to Set It Up by Eric Griffith
- Authy vs. Google Authenticator
- Two Factor Auth (2FA)
What you need to know about email:
- AG Ferguson bill strengthening data breach laws passes legislature
- How to Encrypt and Decrypt Files as an LCC Employee
- How to Encrypt and Decrypt Files with AES Crypt
What you need to know about phishing:
What you need to know about mobile devices:
- Microsoft Outlook: How to Wipe a Mobile Device
- VPN Overview
- VPN Beginner’s Guide
- LCC Mobile Device Guidelines
- LCC Mobile Device FAQ
Keywords: cybersecurity, phishing, password, social network, security, Personally Identifiable Information, PII, identity theft