Get Cyber Safe Challenge 2021

A lot has happened over the past year. Many tasks that might have felt easy in the past now feel like climbing Mount Everest – like, for example, trying to maintain your cyber security while you’re busy working from home.

padlocks, passwords, the numbers 1, 2, 3 and 4

And we get it: cyber security can be pretty overwhelming, especially if it feels like you’re starting from scratch. But we have just the thing to get you back on track.

We’ve created a four-week cyber safety challenge that breaks down cyber security best practices into simple, daily steps that you can follow along with on all of our social media Social mediaInternet-based tools that allow people to listen, interact, engage, and collaborate with each other. Popular social media platforms include Facebook, YouTube, LinkedIn, and Twitter. accounts:

 You can think of it as a 30-day bootcamp challenge for all of your accounts and devices (and they’ll feel beach-ready by the end of it.)

To help you complete the challenge, we’ll have tips and tools to help you:

We’ll also be uploading weekly videos to show you exactly how you can get secure. Challenge accepted? We thought so. Here’s the breakdown:

Week one: Strong passphrases

Passwords are fine, but a strong passphrase is better. This week, we’ll focus on how you can create strong passphrases that are easy to remember, make sure all your accounts have a strong and unique passphrase PassphraseCombination of random words you select to secure an account or device. in place and how to secure those passphrases with a password PasswordCombination of letters and numbers you select to secure an account or device. manager. You can follow along with us on social with the hashtag #GCSPasswords.

  • Step one: Learn how to create a strong passphrase
  • Step two: Make sure all your accounts use a strong and unique passphrase
  • Step three: Use a password manager

Week two: Multi-factor authentication

Using a strong passphrase is a great first step but adding multiple authenticators to your important accounts and devices can make you even more secure. Week two is all about taking stock of your important accounts and finding out how you can make them safer by using multi-factor authentication Multi-factor authenticationA tactic that can add an additional layer of security to your devices and account. Multi-factor authentication requires additional verification (like a PIN or fingerprint) to access your devices or accounts. Two-factor authentication is a type of multi-factor authentication. (MFA). You can follow along with us on social media by using the hashtag #GCSMultiFactor.

  • Step four: Make a list of your most important accounts
  • Step five: Decide what authentication factors work best for you
  • Step six: Turn on multi-factor authentication

Week three: System updates

If you’ve been looking for a sign to update your OS, this is it. We’ll be giving you tips on how to update UpdateUpdates to software and devices add new features, fix bugs, and often contain new security features to protect against attacks. your software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. , how to enable automatic updates and how to get rid of unused apps and software that are taking up space and time. You can follow along with us on social media by using the hashtag #GCSUpdated.  

  • Step seven: Update all your devices
  • Step eight: Turn on automatic updates
  • Step nine: Uninstall unused applications and software

Week four: Securing your Wi-Fi

Your Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. network NetworkSeveral computers that are connected to one another. is the underrated hero that helps you get connected. This week, we’ll be paying homage to our home networks by learning how to change their default DefaultA setting automatically chosen by a program or computer that remains until the user specifies another setting. password and username, creating guest networks and moving your router RouterA network device that is used to establish and control the flow of data between different networks. to a secure location. You can follow along with us on social media with the hashtag #GCSWiFi.

  • Step 10: Change your router’s default password
  • Step 11: Create a guest network
  • Step 12: Move your router to a secure location

Take the challenge

Want to get ahead of the challenge? You can download DownloadTransmission of data from a remote computer system onto a local computer system. the challenge infographic to get through the steps faster.

 

Date modified: