October 17, 2016 By Lucie Hys 2 min read

Are you now successfully employing the cybersecurity tips we shared last week to celebrate National Cyber Security Awareness Month (NCSAM)? Here are seven more NCSAM lessons from IBM Security and the EveryApp team to keep in mind this October and beyond.

1. Don’t Think It Won’t Happen to You

Virus infections, hard drive failures, stolen devices — it happens all the time! Schedule the time to…

2. Keep Your Guard Up When Asked for Sensitive Information

Did you get a call or email asking for sensitive information? Google the company’s phone number, and…

3. Good Antivirus Is a Must

Do you have a good antivirus solution on all your devices? You should. Run regular checks, and…

4. Know Whether the Website Is Secure

When entering personal information on the website, are you paying attention to whether the website is secure? Instead of HTTP, the URL should start with…

5. Shopping Online? Don’t Save Card Details

Saving your card details in an online account is convenient, but…

6. Don’t Open Those Chain Letters

Got a chain letter (email, social media message, etc.) addressed to many recipients asking you to forward it? Fraudsters use chain letters to distribute malware. That’s why…

7. Be Protective of Who Is Entering Your Circle of Trust

Don’t accept friend or connection requests from people you don’t know, and beware — fraudsters are known to create fake profiles to impersonate people you do know.

Share These NCSAM Lessons

Did you know it all? Well done! Share these NCSAM lessons to help others in your network stay safer online.

Illustrations by Nathan Salla

More from Intelligence & Analytics

Hacking the mind: Why psychology matters to cybersecurity

4 min read - In cybersecurity, too often, the emphasis is placed on advanced technology meant to shield digital infrastructure from external threats. Yet, an equally crucial — and underestimated — factor lies at the heart of all digital interactions: the human mind. Behind every breach is a calculated manipulation, and behind every defense, a strategic response. The psychology of cyber crime, the resilience of security professionals and the behaviors of everyday users combine to form the human element of cybersecurity. Arguably, it's the…

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today