Cybersecurity Resources
Essential terms, quick tips, and resources to help you stay secure online.
🎯 Quick Security Wins
Enable MFA Everywhere
Start with email, banking, and social media
Use a Password Manager
Generate and store unique passwords
Update Automatically
Enable auto-updates on all devices
Verify Before You Wire
Call to confirm financial requests
📚 Cybersecurity Glossary
Multi-Factor Authentication (MFA / 2FA)
An extra layer of security that requires two or more verification methods to access an account. Typically combines something you know (password) with something you have (phone app code) or something you are (fingerprint).
Why it matters: Even if someone steals your password, they can't access your account without the second factor.
Phishing
Fraudulent emails, texts, or messages designed to trick you into revealing sensitive information or clicking malicious links. Often impersonate trusted organizations or people.
Red flags: Urgent language, suspicious links, requests for passwords or financial info, slight misspellings in sender addresses.
Password Manager
Software that securely stores and generates strong, unique passwords for all your accounts. You only need to remember one master password.
Popular options: 1Password, Bitwarden, Dashlane, LastPass
VPN (Virtual Private Network)
Creates an encrypted tunnel for your internet traffic, protecting your data from interception. Essential when using public Wi-Fi networks.
Use cases: Public Wi-Fi at airports, hotels, cafes; protecting browsing privacy
End-to-End Encryption (E2EE)
Communication method where only the sender and recipient can read messages. Not even the service provider can access the content.
Apps with E2EE: Signal, WhatsApp, iMessage (between Apple devices)
Ransomware
Malicious software that encrypts your files and demands payment for their release. Often spread through phishing emails or software vulnerabilities.
Protection: Regular backups, updated software, email vigilance, never pay the ransom
Social Engineering
Psychological manipulation techniques used by attackers to trick people into divulging confidential information or performing actions that compromise security.
Examples: Phishing emails, phone scams, pretexting, impersonation
Data Breach
Unauthorized access to confidential data, often resulting in the exposure of personal information like passwords, credit card numbers, or social security numbers.
What to do: Change passwords immediately, enable MFA, monitor credit reports
Zero-Day Vulnerability
A previously unknown security flaw in software that attackers can exploit before developers have a chance to create a fix (patch).
Protection: Keep software updated, use security software, be cautious with new apps
Backup (3-2-1 Rule)
Creating copies of your important data. The 3-2-1 rule: Keep 3 copies of data, on 2 different types of media, with 1 copy stored off-site (cloud or external drive at another location).
Essential for: Recovering from ransomware, hardware failure, or accidental deletion
🔗 Trusted External Resources
CISA (Cybersecurity & Infrastructure Security Agency)
Official U.S. government cybersecurity guidance for individuals and families
cisa.gov/secure-our-world →Federal Trade Commission (FTC)
Consumer protection guidance on online security and identity theft
consumer.ftc.gov/online-security →Have I Been Pwned
Check if your email or passwords have been exposed in data breaches
haveibeenpwned.com →National Cyber Security Centre (NCSC UK)
Practical cybersecurity advice from the UK's national authority
ncsc.gov.uk/cyberaware →Put Your Knowledge Into Action
Take our assessment to see how these concepts apply to your personal security.
Start Your Assessment