Many citizens, schools, libraries, businesses and other organizations use the internet for a variety of tasks, including keeping in contact with family and friends, managing finances, conducting research, enhancing education and conducting official business.
The cyber threat to Wyoming is ever changing. Wyoming offers such a dynamic landscape; from the type of industry and commerce we provide, to the people that support it. We must protect our citizens and critical infrastructure. Many of us also now carry devices in our pockets that are more sophisticated than we ever could have imagined. This goal of this information is to provide you with an overview of the State of Wyoming's efforts in cyber, as well as information resources that may help you operate cybersmart in our digital world.
What are some things you can do?
Your browser is your gateway to the vast world of the internet. It is important to keep it secure. There are a few easy ways to add a little extra security; log out of accounts when you’re finished using them; try browser add-ons that protect against tracking.
Use secure passwords that are difficult to decode, with a mix of numbers, special characters and upper-and-lower case letters or key phrases. When possible, use two-factor authentication and/or PIN # security. Never use any word which is related to you and may be easy to guess, for example by looking at your social media pages.
Protect your privacy
Secure your computer or mobile device prior to shopping online by making sure that antivirus and spyware software is updated and running. Shop with trusted merchants and make sure any online transactions are secure. Lock your device. Lost and stolen devices continue to be the most serious threat for businesses and consumers. Use a secure password that's difficult to decode,with a mix of numbers, special characters and upper-and-lower case letters. Do not participate in unsolicited offers, and do not use public computers or public wireless to conduct sensitive business. Be careful who you trust online. A person can pretend to be someone they are not. Remember that private images and videos you send to friends or post on a social networking site may be easily passed on to others and uploaded to public sites
Use Caution When Opening Email Attachments
A common method cyber criminals use to hack into people's computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.
|PLAN, PRACTICE, PREVENT, PREEMPT, PREVAIL
CRISP was established in 2015 and formed under the commitment that state agency participation in the protection of critical data and information systems is essential.
|MS-ISAC - MULTI-STATE INFORMATION SHARING & ANALYSIS CENTER
The MS-ISAC 24x7 cybersecurity operations center provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification, and mitigation and incident response.
|THE DEPARTMENT OF HOMELAND SECURITY'S UNITED STATES COMPUTER EMERGENCY
US-CERT strives to be a trusted global leader in cybersecurity—collaborative, agile, and responsive in a dynamic and complex environment.
Stop. Think. Connect
OWASP Top 10 Vulnerabilities
National Cyber Awareness System
Stay Safe Online
Protect your Smart Device
Mobile Safety Tips
Krebs on Security