Skip to main content

Cybersecurity attacks are on the rise. Know how to prepare for them today.

Cybersecurity involves protecting people, computers, and information from online threats through the use of tools, rules, and best practices.


Cyberattacks can lead to financial loss or the theft of personal, financial, and medical data. As technology advances, so do the methods used by those attempting to steal information. By following simple guidelines and proven security practices, you can greatly reduce your risk and keep your personal information safe online.


How Cyberattacks occur:

Phishing & Social Engineering

Attackers trick users into revealing sensitive information (like passwords or credit card numbers) through fake emails, websites, or phone calls

Malware (Viruses, Trojans, Ransomware, Worms)

Malicious software is installed on a device to steal data, encrypt files for ransom, or disrupt operations.

Accessing your personal computers, mobile phones, gaming systems and other internet- and Bluetooth-connected devices.

Damaging your financial security, including identity theft.

Blocking your access or deleting your personal information and accounts.


Protecting Yourself Against Cyberattacks:

Limit your personal information online.

Attackers trick users into revealing sensitive information (like passwords or credit card numbers) through fake emails, websites, or phone calls

Create strong passwords by using upper and lower case letters, numbers and special characters. Use a password manager and two methods of verification.

Keep software applications and operating systems up-to-date.

Watch for suspicious activity that asks you to do something right away, offers something that sounds too good to be true, or needs your personal information.

Think before you click. When in doubt, do NOT click.

Protect your home and/or business using a secure Internet connection and Wi-Fi network, and change passwords regularly.

Check your account statements and credit reports regularly.

Be cautious about sharing personal financial information, such as your bank account number, Social Security number or credit card number. 

Only share personal information on secure sites that begin with https://. Do not use sites with invalid certificates. Use a Virtual Private Network (VPN) that creates a more secure connection.

Use antivirus and anti-malware solutions, and firewalls to block threats.

Back up your files regularly in an encrypted file or encrypted file storage device.

Do not click on links in texts or emails from people you don’t know. Scammers can create fake links to websites.

Remember that the government will not call, text or contact you via social media about owing money.

Keep in mind that scammers may try to take advantage of financial fears by calling with work-from-home-opportunities, debt consolidation offers and student loan repayment plans.


What to do During a Cyberattack:

Check your credit card and bank statements for unrecognizable charges.

Check your credit reports for any new accounts or loans you didn’t open.

Be alert for emails and social media users that ask for private information.

If you notice strange activity, limit the damage by changing all of your internet account passwords immediately.

Consider turning off the device that has been affected. Take it to a professional to scan for potential viruses and remove any that they find.

Remember: A company will not call you and ask for control of your computer to fix it. This is a common scam.

Let work, school or other system owners know what happened.

Run a security scan on your device to make sure your system is not infected or acting more slowly or inefficiently.

If you find a problem, disconnect your device from the Internet and perform a full system restore.


What to do After a Cyberattack:

If you believe you’ve been the victim of a cyberattack, it’s important to report it to the appropriate federal, state, and local authorities.

Contact banks, credit card companies and other financial services companies where you hold accounts. You may need to place holds on accounts that have been attacked.

Close any unauthorized credit or charge accounts. Report that someone may be using your identity.

File a report with the Office of the Inspector General if you think someone is using your Social Security number illegally.

File a complaint with the FBI Internet Crime Complaint Center (IC3). They will review the complaint and refer it to the appropriate agency.

File a report with the local police so there is an official record of the incident.

Report identity theft to the Federal Trade Commission.

Remember: A company will not call you and ask for control of your computer to fix it. This is a common scam.

Contact the Federal Trade Commission (FTC) at ftc.gov/complaint if you receive messages from anyone claiming to be a government agent.

Contact additional agencies depending on what information was stolen.
Examples include contacting: The Social Security Administration (800-269- 0271) if your Social Security number was compromised, or
The Department of Motor Vehicles if your driver’s license or car registration has been stolen.

Report online crime or fraud to the Internet Crime Complaint Center.


*Credit: Portions of the information on this page are adapted from Cybersecurity & Infrastructure Security Agency (CISA) FEMA and Ready.gov resources. Their materials were used as foundational guidance and adapted to provide Onondaga County–specific preparedness information.