Cybersecurity Resources

Essential terms, quick tips, and resources to help you stay secure online.

🎯 Quick Security Wins

Enable MFA Everywhere

Start with email, banking, and social media

Use a Password Manager

Generate and store unique passwords

Update Automatically

Enable auto-updates on all devices

Verify Before You Wire

Call to confirm financial requests

📚 Cybersecurity Glossary

Multi-Factor Authentication (MFA / 2FA)

An extra layer of security that requires two or more verification methods to access an account. Typically combines something you know (password) with something you have (phone app code) or something you are (fingerprint).

Why it matters: Even if someone steals your password, they can't access your account without the second factor.

Phishing

Fraudulent emails, texts, or messages designed to trick you into revealing sensitive information or clicking malicious links. Often impersonate trusted organizations or people.

Red flags: Urgent language, suspicious links, requests for passwords or financial info, slight misspellings in sender addresses.

Password Manager

Software that securely stores and generates strong, unique passwords for all your accounts. You only need to remember one master password.

Popular options: 1Password, Bitwarden, Dashlane, LastPass

VPN (Virtual Private Network)

Creates an encrypted tunnel for your internet traffic, protecting your data from interception. Essential when using public Wi-Fi networks.

Use cases: Public Wi-Fi at airports, hotels, cafes; protecting browsing privacy

End-to-End Encryption (E2EE)

Communication method where only the sender and recipient can read messages. Not even the service provider can access the content.

Apps with E2EE: Signal, WhatsApp, iMessage (between Apple devices)

Ransomware

Malicious software that encrypts your files and demands payment for their release. Often spread through phishing emails or software vulnerabilities.

Protection: Regular backups, updated software, email vigilance, never pay the ransom

Social Engineering

Psychological manipulation techniques used by attackers to trick people into divulging confidential information or performing actions that compromise security.

Examples: Phishing emails, phone scams, pretexting, impersonation

Data Breach

Unauthorized access to confidential data, often resulting in the exposure of personal information like passwords, credit card numbers, or social security numbers.

What to do: Change passwords immediately, enable MFA, monitor credit reports

Zero-Day Vulnerability

A previously unknown security flaw in software that attackers can exploit before developers have a chance to create a fix (patch).

Protection: Keep software updated, use security software, be cautious with new apps

Backup (3-2-1 Rule)

Creating copies of your important data. The 3-2-1 rule: Keep 3 copies of data, on 2 different types of media, with 1 copy stored off-site (cloud or external drive at another location).

Essential for: Recovering from ransomware, hardware failure, or accidental deletion

🔗 Trusted External Resources

CISA (Cybersecurity & Infrastructure Security Agency)

Official U.S. government cybersecurity guidance for individuals and families

cisa.gov/secure-our-world →

Federal Trade Commission (FTC)

Consumer protection guidance on online security and identity theft

consumer.ftc.gov/online-security →

Have I Been Pwned

Check if your email or passwords have been exposed in data breaches

haveibeenpwned.com →

National Cyber Security Centre (NCSC UK)

Practical cybersecurity advice from the UK's national authority

ncsc.gov.uk/cyberaware →

Put Your Knowledge Into Action

Take our assessment to see how these concepts apply to your personal security.

Start Your Assessment