FAQs

RSN Home | FAQs | Page 2

Securing the Internet of Things

Anti-Scam FAQ: What Is The Internet of Things? Answer: The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with people and share information machine to machine. Why Should We Care? Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing [...]

2021-06-02T05:43:17-04:00June 2nd, 2021|Categories: |0 Comments

Securing Wireless Networks

Anti-Scam FAQ: What Is A Answer: In today’s connected world, almost everyone has at least one internet-connected device. With the number of these devices on the rise, it is important to implement a security strategy to minimize their potential for exploitation. Internet-connected devices may be used by nefarious entities to collect personal information, steal identities, compromise financial data, and silently listen to—or watch—users. Taking a few precautions in the configuration and use of your [...]

2021-06-02T05:38:45-04:00June 2nd, 2021|Categories: |0 Comments

Good Security Habits

Anti-Scam FAQ: How can I minimize the access others have to my information? Answer: It may be easy to identify people who could gain physical access to your devices—family members, roommates, coworkers, people nearby, and others. Identifying the people who have the capability to gain remote access to your devices is not as simple—as long as your device is connected to the internet, you are at risk for someone accessing your information. However, you [...]

Understanding Firewalls for Home and Small Office Use

Anti-Scam FAQ: What Is A Firewall Answer: When your computer is accessible through an internet connection or Wi-Fi network, it is susceptible to attack. However, you can restrict outside access to your computer—and the information on it—with a firewall. What do firewalls do? Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network [...]

2021-06-02T05:31:07-04:00June 2nd, 2021|Categories: |0 Comments

Preventing and Responding to Identity Theft

Anti-Scam FAQ: Is identity theft just a problem for people who submit information online? Answer: You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at [...]

2021-06-02T05:25:37-04:00June 2nd, 2021|Categories: |0 Comments

Avoiding Social Engineering and Phishing Attacks

Anti-Scam FAQ: What is a social engineering attack? Answer: In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information [...]

2021-06-02T05:20:18-04:00June 2nd, 2021|Categories: |0 Comments

REPORT CYBER INCIDENTS TO CISA

Anti-Scam FAQ: How to report cyber-incidents to DHS/CISA Answer: The growing number of serious attacks on essential cyber networks is one of the most serious economic and national security threats our nation faces. An important way to protect yourself and others from cybersecurity incidents is to watch for them and report any that you find. DHS has a mission to protect the Nation’s cybersecurity and has organizations dedicated to collecting and reporting on cyber [...]

2021-06-02T00:41:37-04:00June 2nd, 2021|Categories: |0 Comments

Using Instant Messaging and Chat Rooms Safely

Anti-Scam FAQ: What are the differences between some of the tools used for real-time communication? Answer: Instant messaging (IM) - Commonly used for recreation, instant messaging is also becoming more widely used within corporations for communication between employees. IM, regardless of the specific software you choose, provides an interface for individuals to communicate one-on-one. Chat rooms - Whether public or private, chat rooms are forums for particular groups of people to interact. Many chat [...]

2021-06-01T21:10:30-04:00June 1st, 2021|Categories: |0 Comments