There is always a risk whenever you transfer information from one computer or mobile device to another. The risk can come in the form of malicious code or people that contact you.
You can protect yourself from malicious code.
- Be careful what you click because viruses can infect your computer. However, a virus usually requires you to do something, like click a link, before it will infect your computer.
- Make sure you stay current with software updates. Worms can find their way in through software flaws. Once in your computer, they self-propagate by finding and infecting other computers through your email, network, or website.
- Only download software from credible sources because you don't want a Trojan horse on your computer. A Trojan is a piece of software that acts like it is doing something to help you, but is actually doing something to hurt you (like stealing your personal information) behind the scenes.
- Install anti-spyware and virus protection software. Spyware is software that sneaks onto your computer when you download something. Then, a third party can spy on what you are doing on the Internet.1
Protect yourself from identity thieves.
- Never give out your Social Security number, PIN, or passwords.
- Create secure passwords.
- Make sure you know how your personal information will be stored and used.2
- Monitor your credit.
- Be sure to review PixelPrivacy's guide for additional signs that you and your personal information have been hacked.
1 https://www.usa.gov/identity-theft
2 https://www.usa.gov/privacy
Basic Users
Are Able To:
- Identify credible sources and online scams.
- Set up computer and mobile devices for secure browsing.
- Understand security settings when setting up an account or shopping online.
- Keep software up to date.
Intermediate Users
Have Basic Skills and Are Able To:
- Set their security settings when using social media.
- Be selective of how much personal data they share.
- Decide who to connect with in social media. Connect with the people they know.
Technical Professionals
Have Intermediate Skills and Are Able To (one or more of the following):
- Encrypt data and communication.
- Access and control identity management.
- Identify threats and vulnerabilities.
- Detect, respond to, and resolve computer and network security attacks.