| |||||||||||||||||||||||||||
October 21, 2015 | |||||||||||||||||||||||||||
Your Evolving Digital LiFE | |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
National Cyber Security Awareness Month | |||||||||||||||||||||||||||
| It’s all connectedThe theme for week two of National Cyber Security Awareness Month (NCSAM) is evolving your digital life. As we transition from an age of the Internet of individuals connecting to technology to an Internet in which everything is connected, we need to tackle the challenge of securing the countless devices that we use and connect. | ||||||||||||||||||||||||||
In this issue:· It’s all connected · Internet of Things · Video Tips · Protect your devices and data · Kb.mc3.edu · Additional Resources | |||||||||||||||||||||||||||
Internet of Things (IoT)As technology advances more “things” become “smart” or connected. 67% of households have between 1 and 5 home devices connected to the Internet. More than 1 in 5 households uses mobile devices or apps to remotely access or control devices in the home. | |||||||||||||||||||||||||||
Video Tips: Review these short videos to gain knowledge of important and relevant cyber security topics. | |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
Protect Your Devices and Data:Keep your devices up to date, install software updates and enable automatic updates for your apps. Use Strong Passwords, change default passwords on new devices, especially your Wi-Fi router. Be attentive for additional security protections that may be available for the particular device, like inactivity timeouts, encrypted storage, two-factor authentication, and firewalls. Know what data the devices collects, and consider how that data is handled and used. Do your homework, and consider independent reviews of the device regarding privacy and security. | |||||||||||||||||||||||||||
Keep in mind the knowledgebase kb.mc3.edu | |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
A great resource for technical How-Tos, including articles about how to secure your smartphone. | |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
| For additional resources visit www.mc3.edu/security - MCCC IT Security Site (requires logon) kb.mc3.edu - MCCC Technical Knowledgebase www.staysafeonline.org/ncsam/resources/what-is-the-internet-of-things-infographic - referenced above cyberaware.securingthehuman.org | ||||||||||||||||||||||||||