Fuse Networks Blog

Cybersecurity Awareness Month: Best Practices For You


October is Cybersecurity Awareness month and this year’s theme is “Our Shared Responsibility”. In today’s always on and connected world, cybersecurity is something we all need to be aware of and take steps to ensure the Internet remains as safe as possible. Recognizing this is an ongoing issue, the 15th annual National Cybersecurity Awareness Month event (NCSAM) will focus on increasing cybersecurity awareness among consumers, students, educators/academia, and businesses.

For the entire month of October, businesses, educational outlets and individuals are encouraged to think more about what they can do to increase cybersecurity, including promoting cybersecurity as a viable career choice.

For the month of October NCSAM will feature a new theme each week:

  • Week 1: Oct. 1­–5: Make Your Home a Haven for Online Safety
  • Week 2: Oct. 8–12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity
  • Week 3: Oct. 15–19: It’s Everyone’s Job to Ensure Online Safety at Work
  • Week 4: Oct. 22–26: Safeguarding the Nation’s Critical Infrastructure

Week 1

The first week focuses on providing the entire family with the basic tools and techniques to protect themselves and their homes against cyberattacks. By emphasizing the fundamentals of cybersecurity in week one, the NCSAM prepares the attendees for greater understanding regarding the home/work dynamic and why it’s important to practice cyber security in both environments. Further, by involving caregivers in the process, they are better equipped to help their students understand the importance of staying safe and secure online.

Week 2

With the cost of education constantly rising, parents are more concerned than ever about what the future holds for their students. Top of mind is what type of jobs will be available for them. As students make their way through high school, higher education and beyond, their paths aren’t always clear. What is apparent however is that students need to think about preparing for the jobs of tomorrow and not those from yesterday. As technology becomes more integrated into all aspects of our society, so do the opportunities to find meaningful careers in cybersecurity.

NCSAM will discuss methods to educate, train and motivate parents, teachers, and counselors to learn more about the field of cybersecurity. This will allow them to better be prepared to inspire students to recognize the value of investing in highly fulfilling cybersecurity careers.

Week 3

The weakest link when it comes to developing an effective security policy is usually your team members. No, not out of malicious intent, but simply human error; usually due to a lack of training. This shortcoming can create unsafe behaviors such as clicking on a suspicious link, or using the same password for personal and private accounts,an action which can leave both accounts compromised.

This is why it is critical that team members understand online security and safety is a shared responsibility and not just something IT deals with. However, the IT department also needs to invest the resources to explain to the team why certain practices need to be followed as opposed to just telling them to just do what they’re told. If your team is invested in keeping the business secure, they will make better partners. Further by linking this theme to the previous week’s on understanding how to keep their home network secure, NCSAM is ensuring they will be receptive to maintaining the office network’s security too.

Week 3 will focus on cybersecurity workforce education, training, and awareness while emphasizing risk management, resistance, and resilience. NCSAM’s CyberSecure My Business™ will shed light on how small and medium-sized businesses can protect themselves, their employees and their customers against the most prevalent threats.

Many of us are unaware of how connected we are to each other and the nation in general. With so many devices connecting to the internet, the ability for a bad actor to attack our infrastructure using residential hacks is a real possibility. With malware such as the VPNFilter, we can see how neglected hardware and out of date software can be used as a vector to attack the system. A disruption to this system, which is operated via the internet, can have significant and even catastrophic consequences for our nation.

To address this, Week 4 will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe. Also, it will lead the transition into November’s Critical Infrastructure Security and Resilience Month, which is spearheaded by the U.S. Department of Homeland Security.

The four individual workshops which make up this year’s theme, reinforce the idea that the lines between personal and professional online use are becoming more blurred and are, in some cases, indistinguishable from one another. Further, this connectivity is both the strength and weakness of our infrastructure, linking all of us as we rise and fall in tandem. In other words, the Internet isn’t just the purview of one entity, but is a shared resource whose security is a responsibility we all must do our part to ensure remains safe.

Finally as an IT service provider, we always strive to stress the importance of IT security - not just to our clients, but to our community as well. We understand that individual actions online can have a cascade effect on how we collectively use the Internet and the strongest defense against attack is when we all use best practices at home and in the office.

If you have learned something new or interesting, please take a moment to share this blog with someone and help us make everyone more #CyberAware. If you have any questions about your security, call the IT professionals at 855-GET-FUSE (438-3873) or complete our contact form.

Our Help Desk Is a Real Benefit
How Machine Learning Can Help Our Health


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 19 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Business Computing Hackers Privacy Innovation Productivity Data Backup Collaboration Android Cybersecurity Data recovery User Tips Computer Data IT Support Software Communications Email Communication Efficiency Google Internet Business Management IT Services Mobile Device Malware Smartphone Hardware Hosted Solutions VoIP Mobile Devices Small Business Office 365 Backup Information Artificial Intelligence Access Control Social Media Smartphones Business Technology Cloud Phishing Blockchain Cybercrime Managed Service Microsoft Office Browser Cost Management Applications Facebook Automation Windows 10 Saving Money Business Data Security Mobile Device Management Workplace Tips Holiday Two-factor Authentication BDR Passwords Apps Maintenance Cloud Computing Internet of Things Vulnerability Ransomware Vulnerabilities Scam Cooperation Gmail Printer Conferencing Vendor Websites Healthcare Tech Terms Document Management Bandwidth Bitcoin Network Mobility Microsoft Data Breach Augmented Reality Quick Tips Alert Patch Management Managed IT services App IT Management Disaster Recovery Google Maps Social Engineering Hacking Apple Remote Monitoring Update Data loss Users Saving Time Outsourced IT Hard Drive Distributed Denial of Service Information Technology Nanotechnology Miscellaneous Directions Virtualization Health IT Security Cameras Comparison Emails Browsers Legal Managed IT Services Mobile Security Social Network Evernote Knowledge Google Calendar Computing Infrastructure Devices Startup Going Green NCSAM iPhone Cryptocurrency Laptop Monitoring Hard Drive Disposal Machine Learning Spam Analytics Medical IT Freedom of Information Operating System Travel Cost Server Downloads Customer Resource management Windows 10 Social Specifications SharePoint Downtime Bluetooth Law Enforcement Paperless Office Networking Compliance Download IT Retail Desktop Management email scam HTML Network Management Proxy Server Data Management News Mobile Technology Username Microchip Cortana Database Telephone System Sports Router Television project management Piracy Wireless Headphones Content Entertainment WiFi Digital Multi-factor Authentication Tech Business Continuity Google Docs Business Cards Regulations Upload Support Managed Service Provider Windows 7 Unified Communications Chromebook Computing eWaste VPN Accountants Encryption Help Desk PowerPoint Audit Fake News Virtual Reality Fuse Networks Processor Disaster Device security Tactics Electronic Medical Records Modem Mouse Money Software License Cleaning BYOD Data Analysis Virtual Assistant Term Legislation Trends CIO Microsoft 365 Printing Excel Antivirus Backup and Disaster Recovery Error Productivity Robot Data Protection Training Gadgets Budget Vendor Management Professional Services Microsoft Excel Company Culture Navigation Emergency Addiction User Tip SSID Computers Fileless Malware Google Play Gamification Bookmark Government Tip of the week Twitter Telephone Big Data Equifax Service Level Agreement Voice over Internet Protocol Computer Care Identity Theft Screen Reader Website Customer Service Printers Mobile Office Hard Drives Integration Upgrade Search Domains Wireless Managing Stress Public Speaking Multi-Factor Security Presentation Wi-Fi Lithium-ion battery Tech Support Wireless Technology 5G IBM Safety Hiring/Firing Marketing Hacker The Internet of Things Fun Customer Relationship Management Competition Employer-Employee Relationship IP Address Solutions Regulation