0% found this document useful (0 votes)
57 views

General Cybersecurity Best Practices Guid

This document provides a general cybersecurity best practices guide with recommendations in several areas: 1) Email security tips including avoiding suspicious links and attachments, verifying unexpected items, and not providing personal information to unknown sources. 2) Password recommendations such as using long, complex passwords without reusing them across accounts and enabling multi-factor authentication. 3) Web browsing advice like only entering credentials on encrypted sites, avoiding public Wi-Fi, and using browser extensions cautiously. 4) Device security guidance including keeping software updated, using antivirus, and creating backup files.

Uploaded by

Sakil Mahmud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

General Cybersecurity Best Practices Guid

This document provides a general cybersecurity best practices guide with recommendations in several areas: 1) Email security tips including avoiding suspicious links and attachments, verifying unexpected items, and not providing personal information to unknown sources. 2) Password recommendations such as using long, complex passwords without reusing them across accounts and enabling multi-factor authentication. 3) Web browsing advice like only entering credentials on encrypted sites, avoiding public Wi-Fi, and using browser extensions cautiously. 4) Device security guidance including keeping software updated, using antivirus, and creating backup files.

Uploaded by

Sakil Mahmud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

TLP: WHITE

NJCCIC
NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL

General Cybersecurity Best Practices Guide


TLP: WHITE |The following is a list of best practices designed to keep individuals and their data safe when connected to the internet.
Email Security
– Avoid opening emails, downloading attachments, or clicking on suspicious links sent from unknown or untrusted sources.
– Verify unexpected attachments or links from known senders by contacting them via another method of communication.
– Avoid providing your email address, phone number, or other personal information to unknown sources.
– Avoid providing sensitive information to anyone via email. If you must, be sure to encrypt it before sending.
– Be skeptical of emails written with a sense of urgency and requesting an immediate response, such as those stating your
account will be closed if you do not click on an embedded link or provide the sender with sensitive information.
– Beware of emails with poor design, grammar, or spelling.
– Ensure an email’s “sender name” corresponds to the correct email address to identify common email spoofing tactics.
– Never open spam emails; report them as spam, and/or delete them. Do not respond to spam emails or use included
“Unsubscribe” links as this only confirms to the spammer that your email address is active and may exacerbate the problem.
Passwords and Multi-Factor Authentication
Use strong passwords on all of your accounts.
– Long, complex passwords make you less susceptible to brute-force attacks.
– Use a combination of upper and lowercase letters, numbers, and special characters.
– Avoid easy-to-guess elements like pets’ names, children’s names, birthdays, etc.
To reduce the risk of account compromise, account holders should:
– Avoid using the same password across multiple accounts or platforms.
– Never share their password with anyone, leave passwords out in the open for others to read, or store them in an unsecured,
plaintext file on computers or mobile devices.
– Consider using long acronyms or passphrases to increase the length of your password.
– Enable two-factor authentication (2FA) or multi-factor authentication (MFA) on all accounts that offer it. This will help
prevent unauthorized access in the event of credential compromise.
On the Web
– Ensure any websites requesting the insertion of account credentials and those used to conduct transactions online are
encrypted with a valid digital certificate to ensure your data is secure. These website addresses will have a green padlock
displayed in the URL field and will begin with https.
– Avoid saving account information, such as passwords or credit card information, in web browsers or browser extensions.
– Avoid using public computers and public Wi-Fi connections to log into accounts and access sensitive information.
– Consider using ad-blocking, script-blocking, and coin-blocking browser extensions to protect systems against malicious
advertising attacks and scripts designed to launch malware or mine cryptocurrency.
– Sign out of accounts and shut down computers and mobile devices when not in use. Program systems and devices to
automatically lock the active session after a set period of inactivity.
Device Security
– Keep all hardware and software updated with the latest, patched version.
– Run reputable antivirus or anti-malware applications on all devices and keep them updated with the latest version.
– Create multiple, redundant backups of all critical and sensitive data and keep them stored off the network in the event of a
ransomware infection or other destructive malware incident. This will allow you to recover lost files, if needed.
For more information, or to learn about prevention and mitigation strategies against specific cyber threats, please visit our website at
cyber.nj.gov.

Traffic Light Protocol: WHITE information may be distributed without restriction.

TLP: WHITE

You might also like