Be Sure to Secure Your Instagram Account: The NJCCIC’s Guide to Accessing Instagram’s Security & Privacy Settings

Be Sure to Secure Your Instagram Account: The NJCCIC’s Guide to Accessing Instagram’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Instagram, a photo and video-sharing social media platform owned by Facebook. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

Be Sure to Secure Your Android Device: The NJCCIC’s Guide to Accessing Your Device’s Security & Privacy Settings

Be Sure to Secure Your Android Device: The NJCCIC’s Guide to Accessing Your Device’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change the privacy and security settings on their Android devices. As we become more reliant upon mobile devices to store, access, and manage our personal and sensitive data, it has become increasingly important to properly secure these devices and maintain awareness of which settings and apps could compromise our privacy.

Be Sure to Secure Your Twitter Account: The NJCCIC’s Guide to Accessing Twitter’s Security & Privacy Settings

Be Sure to Secure Your Twitter Account: The NJCCIC’s Guide to Accessing Twitter’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Twitter. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

Be Sure to Secure Your Facebook Account: The NJCCIC’s Guide to Accessing Facebook’s Security & Privacy Settings

Be Sure to Secure Your Facebook Account: The NJCCIC’s Guide to Accessing Facebook’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Facebook. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

What to Expect When the GDPR Goes into Effect

What to Expect When the GDPR Goes into Effect

The General Data Protection Regulation (GDPR) is the European Union’s latest data protection legislation, developed to address issues regarding data privacy. The GDPR gives EU citizens more control over what companies can do with their data, while increasing fines for non-compliance and data breaches. With a May 25, 2018 enforcement date, many companies are scrambling to ensure they are in compliance with the new regulation. The GDPR will have a worldwide impact on any business or organization that uses and collects EU citizen data.

How to Configure and Secure a Home Wi-Fi Router

How to Configure and Secure a Home Wi-Fi Router

A great way to reduce your cyber risk is to ensure your home Wi-Fi network is properly configured and secured. Think about how many devices are connected to your home’s wireless network right now. In modern households, there could easily be a dozen or more connected devices. Laptop computers, tablets, video game consoles, home security cameras, smart thermostats, and smart home lighting kits all need internet access to work properly. To protect yourself and your home network from cyber threats, there are a few steps you’ll need to take. Use the instructions below to help you set up a new wireless router or even audit and secure your existing set-up.