Cyber Hygiene Principles
|Keep Private Information PRIVATE
||Oversharing exposes you and your loved ones to the risk of cyber bullying, burglary, and social engineering which leads to identity theft or worse.
Embarrassing information about you or other people remains forever on the Internet meaning future employers, colleagues or friends may learn more than you want to be made known.
83% of Internet users ages 18-29 use social media predators appreciate your help if you post your daily routine and whereabouts online.1
Only 18% of young adults claim they are comfortable with what their friends post about them online, and 32% say that the information about them online is what they choose for the public to see.1 (Meaning, 82% are uncomfortable & 68% don't choose what is posted online. ~ editor's note)
Identity theft rose by 57% as thieves use social media as a "hunting ground".11
52% - young people who have reported being cyber bullied.6
|Think before you click
||Spoofed websites and phishing emails try to fool you into clicking bad links. Stop. Think. Then connect as long as you're certain about where the link will take you.
Millennials (age 18-33) are the most likely age group to be the victims of cybercrime.2
40% of Facebook users click on phish links.8
|Look for the S in HTTPS
||"S" stands for secure. A good indicator the website is trusted and your activities are secure!
18-29 year olds issue the most identity theft complaints.1
4 out of 5 victims [of a breach] don't realize they've been attacked for a week or longer.4
|Be cautious with email
||Most phishing is done via email often containing ransomware, malware & social engineering attacks. Don't open attachments or click links from suspicious email.
73% - Americans who have fallen victim to cybercrime.6
Fraud is the most frequent source of cybercrime accounting for 38% of the global cost to consumers.9
Click Here to view other Information Security Topics
- Stop. Think. Connect. National Cybersecurity Awareness Campaign. Undergraduate Student Presentation. Department of Homeland Security (Pew Research Center, "Teens, Social Media, and Privacy." May 2013) https://www.dhs.gov/sites/default/files/publications/Undergraduate%20Student%20Presentation.pdf
- Kaplan University. Security Risks for College Students. Take the Quiz. http://www.kaplanuniversity.edu/security-risks-for-college-students/
- Heimdal Security. Andra Zaharia. May 12, 2016. 10:49 10 Surprising Cyber Security Facts That May Affect Your Online Safety [Updated]. https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/
- BitSight. The Standard in Security Ratings. 28 Data Breach Statistics that will inspire you (to protect yourself). Melissa Stevens. June 14, 2016. https://www.bitsighttech.com/blog/data-breach-statistics
- St. Thomas University. Alumni Association. Did You Know? Interesting, funny, and historical facts. Dec. 2014 - 2015. https://web.stu.edu/alumni/NewsEvents/DidYouKnow/December201415CyberSecurityFactsThatWill/tabid/5847/Default.aspx
- Florida State University. Scary but True Cyber Facts. http://security.fsu.edu/Training/Education/Scary-but-True-Cyber-Facts
- Blueshift Information systems Inc. https://www.blueshift.net/11-facts-about-cyber-threats-you-may-not-know/
- Sophos Ltd. https://nakedsecurity.sophos.com/2016/09/01/40-of-facebook-users-click-on-phishy-links-do-you/?utm_source=Naked+Security+-+Sophos+List&utm_campaign=2c730ec196-naked%252Bsecurity&utm_medium=email&utm_term=0_31623bb782-2c730ec196-455086009
- Credit.com http://blog.credit.com/2013/10/cybercrime-cost-americans-38-billion-in-the-last-year/
- Experian. Facebook fraud: Identity Theft through Social Networking . Copyright 2010, ProtectMyID https://www.protectmyid.com/images/education_center/pdf/050TypesofFraud/7_types%20of%20fraud_social%20networking.pdf
- BBC News Identity fraud up by 57% as thieves "hunt" on social media. July 5, 2016. http://www.bbc.com/news/uk-36701297
KEY WORDS: Personally Identifiable Information (PII), email attachments, oversharing, HTTPS, social engineering, spear phishing, spoofed emails