Ready Cornwall 
Joshua T. Wojehowski
Town Supervisor

James A. Gagliano
Mayor
https

Plan. Prepare. Be Informed.
  Live Events on RavenGIS™
 Submit Photos on RavenGIS™
 
 
[Skip to Main Content]

 

In an increasingly growing interconnected world, we are often unaware that some of our actions can have adverse effects and pose risks not only to us, but our families, our friends, our communities, and even our country. Cyber attacks are a growing threat, especially to the United States. Consequences as you can imagine consist of intellectual property loss, financial loss, service disruptions, reputational damage, and costs of recovery to cyber attacks and incidents. Staying informed about dangers on a resource that touches our lives in many forms every day, to protect ourselves is the first step in making the Internet a safer place for everyone. While attaining 100% security will never happen, cybersecurity is a shared responsibility, preventative measures can be taken by each of us to lessen the likeliness of an exploit or vulnerability.

Cybersecurity involves the protection the infrastructure by preventing, detecting, and responding to cyber incidents. Unlike physical threats or other threats that are easily identified; cyber events are difficult to identify and understand. Among these malicious threats that lurk about are viruses that can erase entire systems, intruders such as tojans breaking into systems, altering files and using your computer or device to attack others, or threats that steal confidential information. The magnitude of these cyber threats are limitless, some having more of an impact with differing severity than others that can have lasting effects on individuals, communities and the nation.


Before

You can take steps and preventative measures to lessen your chances of being vulnerable to cyber risks by following some best practices. The following are best practices you can do to protect yourself, your property, your family, your friends, and your country before a cyber incident occurs.

Stay Safe

  • If at all possible, connect to sites and the Internet using secure protocols such as https and over password protected networks and systems
  • Always exercise caution when proceeding with unfamiliar sites, URLs, links, attachments, emails or files. Many exploits result when the user opens a file or activates an element they are unfamiliar with and are unsure of the source which gives the adversary an opening.
  • Exercise extreme caution concerning requests for personally identifable information. In general most entities such banks and companies will never ask for your personal informtion over the Internet. There are exceptions: such as trusted sites that have URLs that begin with https:// and make use of SSL/TLS, such as the United States Social Security Administration website.
  • Always use up to date antivirus, antimalware, antispyware software.
  • Use hard to guess but meaningful to you and only you passwords. If at all possible use pass phrase over passwords. For example "MyPasswordIsSuperStrong" is an example of a passphrase and is stronger than "Password" a simple password.
  • Perform operating system and program updates regularly.
  • Make regular backups of your files and computer data.
  • Secure your network and Internet connection with a firewall.
  • Enable the strongest available security for your devices: computers, routers, wireless access points, portable devices, handheld devices.

Stay Informed

Cyber incidents are impossible to predict, as are their intent and nature. There may or may not be any warning. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified. Familiarize yourself with the types of threats and protective measures you can take by:

  • Visiting the United States Computer Emergency Readiness Team (US-CERT) mailing list to receive the latest cybersecurity information directly to your inbox. Written for home and business users, alerts provide timely information about current security issues and vulnerabilities. You may Sign up to recieve news and information from US-CERT
  • Visiting the United States Department of Homeland Security website Cybersecurity resource. U.S. DHS Cybersecurity. You may also sign up for DHSs Stop. Think. Connect. Campaign and receive a monthly newsletter with cybersecurity current events and tips.

During

Immediate Actions

  • Check to make sure the software on all of your systems/devices is up to date.
  • Run a virus/malware scan to make sure your system is not infected or acting suspiciously.
  • If you find a problem, disconnect your device from the Internet and perform a full system restore.
    • Disconnecting the device from the Internet takes away its ability to communicate with a potential remote adversary or be used for malicious intents if the system/device has been compromised in this manner.

At Home

  • Disconnect your device (computer, gaming system, tablet, etc.) from the Internet. By removing the Internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, or using your device to attack others.
  • If you have antivirus software installed on your computer, update the virus definitions if possible, and perform a manual scan of your entire system. Install all of the appropriate patches to fix known vulnerabilities.

At Work

  • If you have access to an IT department, contact them immediately. The sooner they can investigate and clean your computer, the less damage to your computer and other computers on the network.
  • If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.

At a Public Place (library, school, etc.)

  • Immediately inform a librarian, teacher, or manager in charge. If they have access to an IT department, contact them immediately.

Immediate Actions if your Personally Identifiable Information (PII) is compromised:

PII is information that can be used to uniquely identify, contact, or locate a single person. PII includes but is not limited to:

  • Full Name
  • Social security number
  • Address
  • Date of birth
  • Place of birth
  • Drivers License Number
  • Vehicle registration plate number
  • Credit card numbers
  • Physical appearance
  • Gender or race

If you believe your PII is compromised:

  • Immediately change all passwords; financial passwords first. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
  • If you believe the compromise was caused by malicious code, disconnect your computer from the Internet.
  • Restart your computer in safe mode and perform a full system restore.
  • Contact companies, including banks, where you have accounts as well as credit reporting companies.
  • Close any accounts that may have been compromised. Watch for any unexplainable or unauthorized charges to your accounts.

After

  • File a report with the local police so there is an official record of the incident.
  • Report online crime or fraud to your local United States Secret Service (USSS) Electronic Crimes Task Force or the Internet Crime Complaint Center.
  • Report identity theft to the Federal Trade Commission.
  • If your PII was compromised, consider other information that may be at risk. Depending what information was stolen, you may need to contact other agencies; for example, if someone has gained access to your Social Security number, contact the Social Security Administration. You should also contact the Department of Motor Vehicles if your drivers license or car registration has been stolen.
  • For further information on preventing and identifying threats, visit US-CERTs Alerts and Tips page.

Resources

Web Resources

Alert Disclaimer

  • U.S. Department of Homeland Security
  • DHS United States Computer Emergency Readiness Team
  • DHS Stop Think Connect Campaign
  • United States Secret Service Electronic Crimes Task Force
  • Federal Bureau of Investigation
  • Department of Justice : Cybercrime
  • Federal Communications Commission
  • Internet Crime Complaint Center
  • Federal Trade Commission
  • National Cyber Security Alliance
  • National Center for Missing and Exploited Children Cyber Tipline
  • Internet Crimes Against Children Taskforce
  • NetSmartz
Free AntiVirus and Spyware Removal Software
System Cleaners and Utilities
Jul 18 2023 06:19 PM
Share This Resource:    

How do I know this site is official?


×

dot govThe .gov means it's official
U.S. Government Websites often end in .gov or .mil. Before sharing sensitive information, make sure you are on a U.S. government website.


HTTPSThe site is secure
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.