Ten Tips to Arm Yourself Against Cyber Threats

10 Cyber Tips

With advancements in online technology moving forward with lightning speed, cybersecurity has become one of the Department of Defense’s top security concerns. Proper adherence to cybersecurity protocols ensures the Army’s defense against online predators, and when one Soldier becomes vulnerable to cyber threats, the entire force can become susceptible. 

The Army Cyber Security Campaign is an ongoing effort to promote awareness and cybersecurity best practices for Soldiers, Civilians, contractors and Family members.

From detailed social media posts to unprotected devices, many issues can leave a service member vulnerable to cyber adversaries. Now more than ever, Soldiers need to be armed with tools like those provided by the Army Cyber Security Campaign to remain protected online. 

In the spirit of the Army Cyber Security Campaign, the following is a list of 10 simple ways to remain aware and protected while online: 

1. Minimize the personal information you share on social media

When using social media, limit the amount of personal details shared. Sharing information like a personal address, birth year or phone number can easily compromise privacy and lead to dangerous consequences. 

“If your post is out there on social media, it’s out there forever and whether [or not] you take it down is inconsequential to the outcome,” said Jack Harrison, a division chief with the National Guard Bureau (NGB)’s Office of Public Affairs who oversees the NGB’s social media and web presence. “Protecting yourself starts from moment one.” 

2. Choose your friends wisely 

While it’s great to be friendly, when it comes to social media, it is important to be critical of potential friendships. Be sure to examine each friend request before hitting accept. Accepting friend requests from people you do not know can be as risky as letting a burglar in your front door. 

3. Refrain from updating your location on social media platforms 

Sharing a current vacation spot or pictures from a recent work event may seem like an exciting thing to do, but it can actually be detrimental to individual security and the security of others. 

“Divulging someone’s exact location would not only be a personal security concern, but an operational security issue relative to the units in which that person serves,” Harrison noted. 

A criminal can easily trace a person or learn daily routines if locations are publicized online. Location information can also be saved through the geotagging on apps like the camera on a phone. Be sure to deactivate the geotagging feature on all mobile devices. 

4. Do not open attached file sent to your inbox if you are unsure of the sender 

Opening an attachment from an unknown source can result in a hacker gaining access to your information. Be sure to only download attachments from senders you recognize and trust. If the subject matter of the email containing the attachment seems suspicious in any way, confirm the email was actually sent by the noted sender before opening the attachment.

5. Read the Terms and Conditions before signing up with any social media platform 

Though it may seem tedious, reading the Terms and Conditions section on a social media platform is vital to ensuring security. Knowing the details of the platform’s privacy settings and regulations helps to confirm how and when personal information is being protected. 

6. Be mindful of your device settings

Bluetooth and other wireless capabilities on cellphones and laptops can leave you vulnerable to hackers. In public settings, be sure to always check your wireless settings and security features so others cannot access your device’s information. 

“The effort to protect information isn’t only about the social media platforms,” Harrison said. “It’s also about the technology in laptops on desks or the cellphones in hands, [and] it’s about making sure to use the technology to protect [oneself].”

7. If you sign in on a public computer, ensure that you properly sign out before leaving 

After using a public computer, it is important to sign out from each account you used. Forgetting to sign out may leave account information and passwords accessible to those who use the computer next. 

8. Change your password often 

Changing passwords at regular intervals is crucial to ensuring accounts are secure. Doing so can deprive hackers the time needed to figure out passwords to break into accounts and steal valuable information. 

9. Keep your devices in the right hands

Be careful about who handles your smartphone and other internet-enabled devices. Social media accounts and other personal information can be accessed through these devices, so be mindful of who is allowed to use them. 

10. Think before you post

When it comes to posting on social media, it is important to think twice not only about the amount of information being posted, but also about the type of information being posted. Posting details that make it easier for hackers to penetrate accounts and steal valuable information is just one concern. Another is posting information that could show you, or fellow unit members, in a bad light. 

“You need to ask yourself how much of your life you want to be exposed,” noted Harrison. “From a military perspective, what would your commander think? One moment of your life can easily go viral and affect or destroy your career.” 

“At the end of the day, it’s all about common sense overruling the desire to be [noticed on social media],” he continued. “You can do both, but you have to be safe and protect yourself by taking some common sense steps at the very beginning.”

By Staff Writer Tatyana White-Jenkins 

Share this Article: