Cyber Security Awareness

Cyber Security Awareness

With the increase of technological conveniences that make our lives easier, we are sharing more of our information now than ever before. This occurs not just through your smart phone or computer but also through your smart watch, the Bluetooth in your car, or even through the app that operates the lights in your apartment. We are constantly connected to the internet which can make us vulnerable to cyber-attacks.

There is no fool proof way to avoid cyber-attacks but here are a few ways to keep yourself safe:

National Cyber Security Awareness Month 2017
Week One: What Is Cyber Security?
Week One: What Is Cyber Security?
<click image to download a .pdf version>
Week Two: Cyber Security at Hostos (Faculty & Staff)
Week Two: Cyber Security at Hostos (Faculty & Staff)
<click image to download a .pdf version>
Cyber Security at Hostos (Students)
Cyber Security at Hostos (Students)
<click image to download a .pdf version>
Week 3: Cyber Security At Home
Week 3: Cyber Security At Home
<click image to download a .pdf version>
Week 4: The Other Side of Cyber Crime
Week 4: The Other Side of Cyber Crime
<click image to download a .pdf version>
Be Cyber Smart for the Holidays! – Find out how
Cybersecurity Holiday Advisory
<click image to download a .pdf version>
Anti-Virus Software

Having anti-virus protection is essential to preventing serious damage to your computer caused by viruses. Many internet service providers (ISP) have free anti-virus software available for customers. Call your ISP or log in to your account to find out how you can download your free copy.

McAfee anti-virus software is also available for free through the CUNY eMall. To download, log into CUNY Portal to access the e-Mall.

CUNY Portal

CUNY eMall

Security Updates

Keep up with the latest security updates and patches for your software, web browsers and operating systems. Most programs will update automatically to keep up with defense against viruses and malware. Make sure automatic updates are turned on if that option is available.

Strong Password Management

Create strong passwords to protect your accounts online. A word or phrase of at least 8 characters that combines letters, numbers and symbols is a great start. Avoid using common words or easy to guess information such as a pet's name or your birthday. Never share your password with anyone and watch out for anyone attempting to obtain your password through an email or over the phone.

Safe Wireless Computing

Before using Wi-Fi in a public place such as a café or in a hotel, be sure to confirm the name of the network first with staff to ensure that the hot spot is genuine. Avoid doing any shopping, banking or any other sensitive activities while connected. Also, create a password for your personal computer to prevent anyone from accessing your information remotely. If available, use your own mobile network connection or wireless hotspot, which is typically more secure than public Wi-Fi.

Protect Your Mobile Devices

Your mobile devices are considered computers and need protection as well. Be sure to secure your phone with a passcode as they tend to contain a lot of personal information about yourself and others. When downloading an app, also make sure you review the privacy policy and understand what data the app has access to such as location, access to social media and your contacts.

Geotagging and Location Sharing

Be wary of geotagging and inadvertently sharing your location through your pictures especially while away from home or on vacation. You could be leaving yourself and your home vulnerable to suspecting burglars. Be sure to disable the function on your smartphones and change the permissions for social media apps. When sharing pictures, convert them to .PNG file format and publish them from your desktop or laptop instead.

What Are Some of the Most Common Internet Scams?

Phishing Attacks

  • What it is: Using an email or malicious website to collect your personal information or to infect your device with viruses.
  • What to watch out for: Cybercriminals may use a legitimate looking site to lure victims to click on a link or email attachment.  A pad lock in the browser window or an "Https" that precedes a URL indicates a secure site.
  • How to avoid it: Type new website URLs directly into the address bar instead of clicking on links.

Imposter/"You've Won" Scams

  • What it is: A phone call or email from a seemingly reliable person requesting that you send money for a family member, friend or government agency. They can also request payment for taxes on a prize or trip that you've won.
  • What to watch out for: Be wary of an email that looks or sounds suspicious, even if it is from a source you’re familiar with.
  • How to avoid it: Any request that urges you to act immediately or an offer that sounds too good to be true could be the signs of a scam.

Identity Theft

  • What it is: The illegal use of someone's personal information to obtain money or credit.
  • What to watch out for: You may have unknown charges on your bank account, see some unusual activity on a credit card or unauthorized applications on your credit report.
  • How to avoid it: Never reveal any personally identifiable information such as your social security number or bank account number to unknown sources.

Click here to find out how you can recover from identity fraud.

Download our free infographic on how to better protect yourself against cyber-attacks!
Available in English and Spanish!
Cybersecurity Infographic (English)
<click image to download a .pdf version>
Cybersecurity Infographic (Español)
<haga click en la imagen para descargar version en .pdf>