Follow CISA's accounts: @CISAgov and @CISACyber
@cyber
This account is not active or monitored. Follow @CISAgov and @CISACyber for the latest updates.
ID:481439919
http://cisa.gov 02-02-2012 19:14:25
4,7K Tweet
308,8K Takipçi
116 Takip Edilen
Follow People
.Cybersecurity and Infrastructure Security Agency's Eric Goldstein and @AWScloud's Jordana Siegel talk about critical cyber threats to our nation's infrastructure at #CyberTalks
There are multiple ways to be safe while we’re online:
💻 Update software
🔑 Use strong passwords
🧠 Think before you click
📱 2-factor authentication
Learn about #cybersecurity + how it impacts you: cisa.gov/4-things-you-c…
#SeeYourselfInCyber #CybersecurityAwarenessMonth
Last week, Cybersecurity and Infrastructure Security Agency Deputy Director Natarajan traveled to University of Oregon for their Cyber Resilience Summit. He spoke w/Director of Information Security, José Domínguez on cyber workforce diversity.
Natarajan also presented the Oregon Cyber Challenge Cup. Congrats to all participants!
District Leaders: $$$ Grant Opportunity $$$ Did you know Homeland Security just released a $1 Billion grant program to support state & local agencies with cybersecurity planning and governance? Get involved at cisa.gov/cybergrants #cybersecurityawarenessmonth
How do you #SeeYourselfInCyber ? Cyber looks different for everyone and the value of a cybersecurity career is unmatched. Check out all the different programs, events, & tools we provide that can help further your cyber career! cisa.gov/cybersecurity-… #CyberCareerWeek #CyberMonth
Here's how the cybersecurity industry has helped Princess Fauci #sharethemicincyber find her community and how you can #SeeYourselfInCyber . #CyberMonth
ICYMI - Leaders from Cybersecurity and Infrastructure Security Agency joined the AHA Advancing Health podcast to discuss complimentary resources they offer hospitals and health systems to combat cyber attacks. 🎧Listen now🎧ow.ly/tPjx50LeOhB
Phishing emails are the number one means of attack used by malicious cyber actors. Knowing how to detect and recognize a phishing email can greatly reduce your chances of becoming a phishing victim. Tips here: on.ny.gov/3fxfDiK Cybersecurity and Infrastructure Security Agency NYS ITS State of New York
When it comes to MFA adoption, it’s time for radical transparency. We're urging business leaders & technology vendors to share their MFA adoption stats, to regularly nudge end-users to adopt MFA, & ultimately move towards FIDO adoption: go.dhs.gov/ZpX #MoreThanAPassword
Join the Cybersecurity and Infrastructure Security Agency and Girls Who Code as we celebrate #CybersecurityAwarenessMonth and Cybersecurity Career Awareness Week! bit.ly/3s2KjeK
You can solve puzzles! Every day, cyber professionals connect the dots to understand the how, what, and why behind a cyber threat or attack. Sound fun? cisa.gov/cyberjobs #CyberCareerChat twitter.com/CISAJen/status…
It only takes one click to give hackers access to your accounts and potentially other users of the same bank, mail service, etc. This year's #CyberMonth theme is #SeeYourselfinCyber - join Cybersecurity and Infrastructure Security Agency and learn how to secure your info ⬇️. #BeCyberAware cisa.gov/4-things-you-c…
💾 Malware
💸 Ransomware
📧 Phishing
These are just a few of the cyber threats facing small businesses.
➡️ Keep your #shieldsup and strengthen cybersecurity with these tips: sba.gov/cybersecurity
➡️ Explore more resources from Cybersecurity and Infrastructure Security Agency: cisa.gov/small-business
#CyberMonth
Creating strong passwords is an easy way to improve your cybersecurity. Strong passwords include one uppercase letter, one lowercase letter, at least one number, & 12+ characters. Be sure to use different passwords each account. More tips at cisa.gov/cybersecurity-… #CyberMonth
It takes all of us! Here’s how Julie Seth, a student advocate, sees herself in cyber. #SeeYourselfInCyber
PS – we’re joining @NISTCyber tomorrow at 2 pm ET for a #CyberCareerChat . This is a great opportunity to learn how to break into cybersecurity and how to grow your career.
Let's talk MFA! Rachel Tobac walks you through threat modeling to choose the right MFA for you. Hint: do you have admin access or an elevated threat model? FIDO key may be a great match for you!
No matter your threat model, use some type of MFA today: cisa.gov/mfa