Follow CISA's accounts: @CISAgov and @CISACyber(@cyber) 's Twitter Profileg
Follow CISA's accounts: @CISAgov and @CISACyber

@cyber

This account is not active or monitored. Follow @CISAgov and @CISACyber for the latest updates.

ID:481439919

linkhttp://cisa.gov calendar_today02-02-2012 19:14:25

4,7K Tweet

308,8K Takipçi

116 Takip Edilen

Follow People
DHS S&T(@dhsscitech) 's Twitter Profile Photo

There are multiple ways to be safe while we’re online:

💻 Update software
🔑 Use strong passwords
🧠 Think before you click
📱 2-factor authentication

Learn about + how it impacts you: cisa.gov/4-things-you-c…

There are multiple ways to be safe while we’re online: 💻 Update software 🔑 Use strong passwords 🧠 Think before you click 📱 2-factor authentication Learn about #cybersecurity + how it impacts you: cisa.gov/4-things-you-c… #SeeYourselfInCyber #CybersecurityAwarenessMonth
account_circle
Jen🛡Easterly(@CISAJen) 's Twitter Profile Photo

We know there’s a need to create & foster a diverse cybersecurity workforce, but how do we get there? An important factor is building a culture of belonging where everyone, regardless of who they are or where they’re from, can see themselves in cyber: belfercenter.org/publication/we…

We know there’s a need to create & foster a diverse cybersecurity workforce, but how do we get there? An important factor is building a culture of belonging where everyone, regardless of who they are or where they’re from, can see themselves in cyber: belfercenter.org/publication/we…
account_circle
Jen🛡Easterly(@CISAJen) 's Twitter Profile Photo

🔥Hot off the trading floor—ringing the NYSE 🏛 bell was fun, but I’m more excited about the ways we’re bringing together the private & public sector to better protect our nation from cyber threats. This month, it's all about how you can :
cisa.gov/cybersecurity-…

account_circle
Follow CISA's accounts: @CISAgov and @CISACyber(@cyber) 's Twitter Profile Photo

Last week, Cybersecurity and Infrastructure Security Agency Deputy Director Natarajan traveled to University of Oregon for their Cyber Resilience Summit. He spoke w/Director of Information Security, José Domínguez on cyber workforce diversity.

Natarajan also presented the Oregon Cyber Challenge Cup. Congrats to all participants!

Last week, @CISAgov Deputy Director Natarajan traveled to @uoregon for their Cyber Resilience Summit. He spoke w/Director of Information Security, José Domínguez on cyber workforce diversity. Natarajan also presented the Oregon Cyber Challenge Cup. Congrats to all participants!
account_circle
Jen🛡Easterly(@CISAJen) 's Twitter Profile Photo

What can happen when a person clicks a malicious link AND what technical tools can we use to make link clicking way less dangerous? We collaborated with @racheltobac to give you the details. go.dhs.gov/ZS2

account_circle
Office of Ed Tech(@OfficeofEdTech) 's Twitter Profile Photo

District Leaders: $$$ Grant Opportunity $$$ Did you know Homeland Security just released a $1 Billion grant program to support state & local agencies with cybersecurity planning and governance? Get involved at cisa.gov/cybergrants

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

How do you ? Cyber looks different for everyone and the value of a cybersecurity career is unmatched. Check out all the different programs, events, & tools we provide that can help further your cyber career! cisa.gov/cybersecurity-…

account_circle
American Hospital Association(@ahahospitals) 's Twitter Profile Photo

ICYMI - Leaders from Cybersecurity and Infrastructure Security Agency joined the AHA Advancing Health podcast to discuss complimentary resources they offer hospitals and health systems to combat cyber attacks. 🎧Listen now🎧ow.ly/tPjx50LeOhB

account_circle
NYS Div. of Homeland Security & Emergency Services(@NYSDHSES) 's Twitter Profile Photo

Phishing emails are the number one means of attack used by malicious cyber actors. Knowing how to detect and recognize a phishing email can greatly reduce your chances of becoming a phishing victim. Tips here: on.ny.gov/3fxfDiK Cybersecurity and Infrastructure Security Agency NYS ITS State of New York

Phishing emails are the number one means of attack used by malicious cyber actors. Knowing how to detect and recognize a phishing email can greatly reduce your chances of becoming a phishing victim. Tips here: on.ny.gov/3fxfDiK @CISAgov @NYSITS @NYGov
account_circle
Jen🛡Easterly(@CISAJen) 's Twitter Profile Photo

When it comes to MFA adoption, it’s time for radical transparency. We're urging business leaders & technology vendors to share their MFA adoption stats, to regularly nudge end-users to adopt MFA, & ultimately move towards FIDO adoption: go.dhs.gov/ZpX

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

You can solve puzzles! Every day, cyber professionals connect the dots to understand the how, what, and why behind a cyber threat or attack. Sound fun? cisa.gov/cyberjobs twitter.com/CISAJen/status…

account_circle
The FCC(@FCC) 's Twitter Profile Photo

It only takes one click to give hackers access to your accounts and potentially other users of the same bank, mail service, etc. This year's theme is - join Cybersecurity and Infrastructure Security Agency and learn how to secure your info ⬇️. cisa.gov/4-things-you-c…

account_circle
SBA(@SBAgov) 's Twitter Profile Photo

💾 Malware
💸 Ransomware
📧 Phishing

These are just a few of the cyber threats facing small businesses.
➡️ Keep your and strengthen cybersecurity with these tips: sba.gov/cybersecurity
➡️ Explore more resources from Cybersecurity and Infrastructure Security Agency: cisa.gov/small-business

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Creating strong passwords is an easy way to improve your cybersecurity. Strong passwords include one uppercase letter, one lowercase letter, at least one number, & 12+ characters. Be sure to use different passwords each account. More tips at cisa.gov/cybersecurity-…

Creating strong passwords is an easy way to improve your cybersecurity. Strong passwords include one uppercase letter, one lowercase letter, at least one number, & 12+ characters. Be sure to use different passwords each account. More tips at cisa.gov/cybersecurity-… #CyberMonth
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

It takes all of us! Here’s how Julie Seth, a student advocate, sees herself in cyber.

PS – we’re joining @NISTCyber tomorrow at 2 pm ET for a . This is a great opportunity to learn how to break into cybersecurity and how to grow your career.

account_circle
Jen🛡Easterly(@CISAJen) 's Twitter Profile Photo

Let's talk MFA! Rachel Tobac walks you through threat modeling to choose the right MFA for you. Hint: do you have admin access or an elevated threat model? FIDO key may be a great match for you!

No matter your threat model, use some type of MFA today: cisa.gov/mfa

account_circle