October 17, 2016 By Lucie Hys 2 min read

Are you now successfully employing the cybersecurity tips we shared last week to celebrate National Cyber Security Awareness Month (NCSAM)? Here are seven more NCSAM lessons from IBM Security and the EveryApp team to keep in mind this October and beyond.

1. Don’t Think It Won’t Happen to You

Virus infections, hard drive failures, stolen devices — it happens all the time! Schedule the time to…

2. Keep Your Guard Up When Asked for Sensitive Information

Did you get a call or email asking for sensitive information? Google the company’s phone number, and…

3. Good Antivirus Is a Must

Do you have a good antivirus solution on all your devices? You should. Run regular checks, and…

4. Know Whether the Website Is Secure

When entering personal information on the website, are you paying attention to whether the website is secure? Instead of HTTP, the URL should start with…

5. Shopping Online? Don’t Save Card Details

Saving your card details in an online account is convenient, but…

6. Don’t Open Those Chain Letters

Got a chain letter (email, social media message, etc.) addressed to many recipients asking you to forward it? Fraudsters use chain letters to distribute malware. That’s why…

7. Be Protective of Who Is Entering Your Circle of Trust

Don’t accept friend or connection requests from people you don’t know, and beware — fraudsters are known to create fake profiles to impersonate people you do know.

Share These NCSAM Lessons

Did you know it all? Well done! Share these NCSAM lessons to help others in your network stay safer online.

Illustrations by Nathan Salla

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today