Navigate Up
Emergency Services
Menu +

Cyber Terrorism

Published on: 2/13/2013 4:19 PM
Print
​Terrorists may use your personal computer to launch attacks on government or business, often stealing or destroying important information with the potential to disrupt critical infrastructures.  Do not be the weak link in the chain.
 
AWARENESS
Be wary of strangers.
 
COMMUNICATION
Report unusual activities to the authorities.
 
PASSWORDS
Select good passwords that cannot be easily guessed.
 
BACKUP
Backup critical data regularly.
 
SOFTWARE
  • Use virus protection software.
  • Use a firewall as a gatekeeper between your computer and the internet.
  • Download security patches from your software vendors regularly.
DISCONNECT
Disconnect your computer from the internet when not in use.
 
(Attribution:  USA Freedom Corps, NCPC, & DOJ)