Be Sure to Secure Your Instagram Account: The NJCCIC’s Guide to Accessing Instagram’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Instagram, a photo and video-sharing social media platform owned by Facebook. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

Read More
Be Sure to Secure Your Android Device: The NJCCIC’s Guide to Accessing Your Device’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change the privacy and security settings on their Android devices. As we become more reliant upon mobile devices to store, access, and manage our personal and sensitive data, it has become increasingly important to properly secure these devices and maintain awareness of which settings and apps could compromise our privacy.

Read More
Be Sure to Secure Your Twitter Account: The NJCCIC’s Guide to Accessing Twitter’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Twitter. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

Read More
Be Sure to Secure Your Facebook Account: The NJCCIC’s Guide to Accessing Facebook’s Security & Privacy Settings

The NJCCIC is providing this guide to help our members and website visitors manage their cyber risk and maintain the security and privacy of their information. This guide provides users with the steps needed to access and change privacy and security settings, as well as instructions on how to view the user data collected by Facebook. It has become increasingly important for users to be aware of the type of personal data being collected – and often sold – by these free online services.

Read More
What to Expect When the GDPR Goes into Effect

The General Data Protection Regulation (GDPR) is the European Union’s latest data protection legislation, developed to address issues regarding data privacy. The GDPR gives EU citizens more control over what companies can do with their data, while increasing fines for non-compliance and data breaches. With a May 25, 2018 enforcement date, many companies are scrambling to ensure they are in compliance with the new regulation. The GDPR will have a worldwide impact on any business or organization that uses and collects EU citizen data.

Read More
How to Configure and Secure a Home Wi-Fi Router

A great way to reduce your cyber risk is to ensure your home Wi-Fi network is properly configured and secured. Think about how many devices are connected to your home’s wireless network right now. In modern households, there could easily be a dozen or more connected devices. Laptop computers, tablets, video game consoles, home security cameras, smart thermostats, and smart home lighting kits all need internet access to work properly. To protect yourself and your home network from cyber threats, there are a few steps you’ll need to take. Use the instructions below to help you set up a new wireless router or even audit and secure your existing set-up.

Read More
Network SecurityNJCCIC
Don’t Let a Romance Scam Break Your Heart or Empty Your Bank Account

With Valentine’s Day just around the corner, love is in the air and those who currently lack a significant other may decide to join a dating website to meet new relationship prospects. Unfortunately, there are plenty of scam artists who target dating site users and try to swindle money from them by exploiting their desire for companionship. The FBI calls these types of online encounters Romance Scams and reported that, in 2016, victims of this type of scam lost over $230 million.

Read More
ScamsNJCCICScams
Protect Your Mobile Phone Numbers from Porting Scams

In August 2017, the NJCCIC published the blog post Hackers Are Circumventing 2FA and Here's What You Can Do About It to alert members of emerging social engineering campaigns targeting mobile phone carriers. In these campaigns, hackers called the carriers and impersonated the targeted victim when speaking to customer service representatives. They would then try to convince the representatives to port the victim’s phone number to a new phone. If the scheme worked and the representative ported the number to a phone within the hacker’s possession, the hacker could then use it to circumvent SMS-based two-factor authentication (2FA) enabled on the targeted victim’s online accounts. Fortunately, major US mobile phone carriers have recently implemented an additional security control that their customers can use to secure their accounts. Read our blog to find out more.

Read More
Mobile SecurityNJCCICMobile
Tired of Receiving Scam Calls? Don’t Just Sit There. Do Something About It.

Americans are inundated daily with scam calls and many may not know there are options available that help reduce the chance of receiving or answering a fraudulent phone call. This blog highlights one analyst's frustrations in receiving several of these nuisance calls every day and her effort to stop them by exploring various options provided by major US cell phone carriers.

Read More
NTP: Time is of the Essence

Time synchronization is not something many people may consider to be a critical component of a properly functioning enterprise; however, it is vital for managing, securing, debugging, and investigating security incidents on a network. Desynchronized timekeeping across distributed servers in a corporate network can cause serious headaches for IT staff trying to diagnose network issues or investigators trying to get to the bottom of a data breach.

Read More
Backups: The Cure to Viral Cyber Infections

Given the steady uptick in ransomware across the country, and right here in our State, we simply cannot overstate the importance of maintaining good backups that are stored offline (physically off of the network) and regularly tested to ensure you can fully recover in the event of a data loss incident. But what, specifically, does that mean to you and how do you go about implementing a sound data backup and recovery strategy?

Read More
The Internet of Insecure Things

The US Government is currently drafting a 'green paper' in preparation of presenting a formal policy on the Internet of Things (IoT), acknowledging the highly insecure technologies that have hit the market in recent years. Demonstrating the growth of this market, the research and consulting firm Gartner, Inc. forecasts that 6.4 billion connected devices will be in use worldwide in 2016, increasing to 20.8 billion by 2020. 

Read More