Guidelines for Individuals
Conduct an audit of all online accounts that contain personal information; delete any that are no longer necessary
Enable two-factor authentication (2FA) on all online accounts and mobile apps that offer it
If your social media contains personal information and photos, restrict settings to avoid public posts
Secure your home WiFi by requiring a strong password to access the network
Change default admin passwords on connected devices such as cameras, thermostats, and appliances
Never respond to unsolicited emails or phone calls requesting your personal, medical, or financial information
Enable full disk encryption on personal computers, if available
Never make purchases or enter sensitive information on websites that do not display 'HTTPS' in the address
Guidelines for Businesses
Collect the minimum amount of sensitive personally identifiable information (PII) and retain for only as long as necessary
Conduct an audit of all systems for sensitive PII; delete any for which there is no reason to retain
Implement policies and train employees on the proper methods to safeguard data
Embrace the principle of least privilege and the separation of duties
Encrypt sensitive data in transit and at rest
Require multi-factor authentication for remote access into the corporate network and privileged access to systems
Ensure all software and hardware is maintained at vendor supported patch levels
Segregate networks containing systems that process or store sensitive data from other corporate networks
Implement protective technologies including web and email filtering, endpoint protection, and application whitelisting
Additional NJCCIC Resources
Best Practices: Learn all about cybersecurity best practices on email security, passwords and multi-factor authentication, exploring the internet, and device security.
Be Sure to Secure: Discover information on various cybersecurity topics as well as instructional guides designed to teach you how to properly secure devices, data, and networks.
Threat Analysis: Catch up on the latest cyber threats!