Department of Defense Education Activity

If you connect it, protect it!

Secure internet-connected devices for personal and professional use. In a world where we are constantly connected, cybersecurity cannot be limited to the home or the office. Make sure all of your computers, Internet of Things devices (Smart TVs, etc.), phones, and tablets are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.

There is potential vulnerability with all internet-connected devices.

The best defense against viruses and malware is to update to the latest vendor-released security software, web browser, and operating systems. Sign up for automatic updates, if you can, and smarten up on the latest cyber threats.

Check out the Federal Trade Commission (FTC) free online security tips and resources, and share with your friends, family, coworkers, educators and community.

🛡️ OnGuard Online
🛡️ Download the DHS Tipsheet on Home Security

SmartHomes - Today's technology enable us to control our devices from our smartphones, saving time and money while providing convenience and even safety. These advances in technology are innovative and intriguing, however, they introduce new security risks.

#BeCyberSmart and connect with confidence by protecting your digital home. Download the 5 Steps to Protecting Your Digital Home tip sheet.

Internet of Things

The Internet of Things (IoT) is the concept of connecting any device (so long as it has an on/off switch) to the internet and to other connected devices. It is a giant network of connected things and people — all of which collect and share data about the way they are used and about the environment around them.

The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the internet, you and your device could potentially be vulnerable to all sorts of risks. With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.

Download the Internet of Things tip sheet.

Computer Theft

Computers and portable electronic devices -such as cell phones and tablets- are a target of choice for thieves all over the world. Why? Because they are small, valuable, can be removed quickly, are easily hidden, and there is a market for them. A thief can sell a stolen laptop, MP3 player, or other device to an unsuspecting used computer store or pawnshop, and easily receive up to half its value in cash. Not to mention, the data that's stored on such devices can be of value as well.

Reminder: Never leave your computer unattended in public places. Report lost or stolen computers immediately.

Contact IT Customer Support Services for additional support (VPN & CAC required).
Contact: Nicole McNealy, IT Communications, for questions about this page
Denotes alink that requires CAC Authentication