Check out all the great resources below for even more Cyber Security information!
10 Things You Should Know About Your Digital Footprint
Some of the heaviest users of online tools and social media, are our young students, who are growing up as a generation of visual learners and visual attention seekers. This is in fact the Facebook and YouTube generation, and the reality is that many teens are unconcerned about the dangers of sharing personal information online.
Crooks use clever schemes to defraud millions of people every year. They often combine new technology with old tricks to get people to send money or give out personal information. Here are some practical tips to help you stay a step ahead.
Best Practices for Keeping Your Home Network Secure
The National Security Agency has some tips on protecting, monitoring, and maintaining your computer network at home.
Connecting Your New Computer to the Internet
Tips for safely connecting a new (or newly upgraded) computer to the internet for the first time
Email Scams - Recognizing and Avoiding
An introduction to what email scams are, how they work, and how to avoid them
Identity Theft Protection Tips
The Attorney General and the Consumer Protection Unit of the Department of Justice offer the following advice to protect citizens of Delaware from identity theft.
Office Desk Security Quiz
Is your office desk a secure environment? Take this online quiz and see.
Phishing IQ Test
How good are you at distinguishing between a 'real' email and a 'phishing' email? Take this online quiz and see.
Protecting Your Home Computer
The Federal Bureau of Investigation provides extremely important information on protecting your home computer from hackers.
Securing Your Web Browser
Configure your web browser for safer internet surfing
Shredding Best Practices
The Do's and Don'ts of shredding - for home and office.
Software License Agreements: Ignore at Your Own Risk
An overview of the risks computer users may incur by blindly agreeing to terms contained in software licensing agreements
Spam Elimination: Tips and Tools
What is Spam, and how to avoid it.
An introduction to computer viruses, worms, and trojans, and ways to avoid them.
- Safe and Secure Online
- Secure Online Banking & Shopping
- Top 10 Online Safety Tips for Seniors
- Strong P@ssw0rd$
- Scam Awareness
General IT Security
National Institute of Standards and Technology (NIST) - General IT Security
The Computer Security Division of NIST’s Information Technology Laboratory provides standards and technology to protect federal information systems against threats to the confidentiality, integrity, and availability of information and services.
SANS Application Security Working Papers
This set of working papers will provide up-to-date information from "industry thought leaders and enterprise pros already leading the application security charge in the trenches".
What To Do If You're A Victim
Groups Organized Against Cyber Crime
- K9 Web Protection (free)
- Lavasoft Ad-Aware (free)
- Windows Security Essentials (free)
- Spybot Search & Destroy (free)
- Trend Micro Free Tools (free)
- Avast Virus Protection (free)
- Panda Software
- McAfee Virus Protection
Delaware Cyber Security Laws
- Title 6- Chapter 12b - COMPUTER SECURITY BREACHES
Title 11-Chapter 5- SPECIFIC OFFENSES
932 - Unauthorized Access
933 - Theft of Computer Services
934 - Interruption of Computer Services
935 - Misuse of Computer System Information
936 - Destruction of Computer Equipment
937 - Unrequested or Unauthorized Electronic Mail or Use of Network or Software to Cause Same
938 - Failure to Promptly Cease Electronic Communication Upon Request
939 - Penalties
940 - Venue
941 - Remedies of Aggrieved Persons