Cyber Hygiene The Big Picture © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
Protect your public persona Protect your private information Protect devices and software Protect the economy and infrastructure Why Focus on Cyber Hygiene?
Five Areas of Readiness ActionDescription IdentifyWhat's at risk? Data, devices, … ProtectHow do you prevent a problem? DetectHow do you identify a problem? RespondHow do you contain a problem? RecoverHow do you get back to normal?
How to Handle It Document Report Do not escalate Cyberbullying How to Think About It The Internet is not anonymous. Picture the person! Keep it human.
Cyber security jobs are projected to expand 5-fold in next few years Cyber attacks are now a common military weapon, targeting businesses Cyber espionage costs U.S. $400b/yr High Demand in Cybersecurity Jobs
Don't get too personal online Protect passwords Use a firewall and anti-virus software Use only well-reviewed software Do not visit pornographic and hacking sites Backup your data; loss is inevitable General Security
Backup your data; loss is inevitable Regularly schedule time to backup data from servers, portable storage, and your devices Protect from physical loss Protect Your Data