{"id":394,"date":"2022-02-03T20:27:08","date_gmt":"2022-02-03T20:27:08","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=394"},"modified":"2023-09-29T15:59:54","modified_gmt":"2023-09-29T15:59:54","slug":"internet-safety-and-cybersecurity-awareness-for-college-students","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-for-college-students\/","title":{"rendered":"Internet Safety and Cybersecurity Awareness for College Students"},"content":{"rendered":"<p>We increasingly rely on the internet and digital devices for daily tasks like communicating with each other, accessing financial services, and working and learning remotely.<\/p>\r\n<p>In 2018, 92% of American households had at least one computer, smartphone, or tablet, and 85% had broadband internet, reported the <a href=\"https:\/\/www.census.gov\/newsroom\/press-releases\/2021\/computer-internet-use.html\" target=\"_blank\" rel=\"noopener\">U.S. Census Bureau<\/a>. The percentage of Americans using the internet has risen from 52% in 2000 to <a href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/internet-broadband\/\" target=\"_blank\" rel=\"noopener\">93% in 2021<\/a>, according to the Pew Research Center.<\/p>\r\n<p>The Covid-19 pandemic accelerated the trend of distance education in higher learning. In the fall of 2020, <a href=\"https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80\" target=\"_blank\" rel=\"noopener\">75% of college students<\/a> enrolled in at least one distance education course.<\/p>\r\n<p>The extensive use of digital devices and sharing information online can open you up to various <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-facts-statistics\/\">cybersecurity dangers<\/a>. Understanding how to protect yourself from these dangers is crucial.<\/p>\r\n<p>The best way to fight cybercrime is through awareness and prevention. Use the following statistics, stories, and tips to arm yourself on and off campus.<\/p>\r\n\r\n<h2>Why Cybersecurity Awareness Is Important<\/h2>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">Cyberattacks<\/a> are malicious attempts to breach computers and information systems.<\/p>\r\n<p>Cybercriminals often seek to use others' digital data to benefit themselves. They use phishing scams and other social engineering techniques, malware, and ransomware to attack individuals and organizations.<\/p>\r\n\r\n<sonic-callout theme=\"secondary-light\" class=\"shadow-lg\">\r\n<h3 class=\"text-center\">Cybersecurity Fast Facts<\/h3>\r\n<p><sonic-icon icon='plus' type='solid' size='medium' color='#1222B6'><\/sonic-icon> 20% of Gen Zers and 18% of Millennials have had their identity stolen at least once<\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='medium' color='#1222B6'><\/sonic-icon> 2.76 million cybercrime complaints reported to the FBI from 2017-2021<\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='medium' color='#1222B6'><\/sonic-icon> $18 billion in total losses due to cybercrime from 2017-2021<\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='medium' color='#1222B6'><\/sonic-icon> 6.95 million new phishing and scam pages created in 2021<\/p>\r\n<p style=\"text-align: right; color:aliceblue;\"><strong><i>Sources: <\/i><\/strong><a href=\"https:\/\/20740408.fs1.hubspotusercontent-na1.net\/hubfs\/20740408\/CYBSAFE-Oh%20behave%20report%202022-220927%20MS%20-%20V1.pdf\" target=\"_blank\" rel=\"noopener\"><i>National Cybersecurity Alliance<\/i><\/a><i>, <\/i><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\"><i>FBI Internet Crime Center<\/i><\/a><i>, <\/i><a href=\"https:\/\/bolster.ai\/resources-center\/download\/report\/2021-phishing-online-fraud\" target=\"_blank\" rel=\"noopener\"><i>Bolster<\/i><\/a><\/p>\r\n<\/sonic-callout>\r\n\r\n\r\n<p>The number of cyberattacks continues to rise each year with the addition of networked devices. Cybercriminals have also developed more sophisticated tactics to gain access to private information. <a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2022\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a> estimates that by 2025, cybercrime costs may cost the U.S. $10.5 trillion yearly.<\/p>\r\n<p><a href=\"https:\/\/www.fbi.gov\/news\/press-releases\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2021-internet-crime-report\" target=\"_blank\" rel=\"noopener\">The FBI Internet Crime Complaint Center<\/a> (IC3) reported an increase in suspected internet crimes from 300,000 in 2019 to 791,790 in 2020, with losses exceeding $4.1 billion. The FBI IC3 report for 2021 reports a 7% increase from 2020, with losses exceeding $6.9 billion<\/p>\r\n<p>Cyberattack victims can suffer financial, legal, and psychological consequences. Cybercriminals can steal personal information and damage reputations.<\/p>\r\n<p>Although college students may think of themselves as tech-savvy digital natives, <a href=\"https:\/\/atlasvpn.com\/blog\/millennials-and-gen-zers-are-most-likely-to-fall-for-phishing-emails-study-finds#:~:text=According%20to%20data%20analyzed%20by,phishing%20emails%20in%20the%20past.\" target=\"_blank\" rel=\"noopener\">2021 research<\/a> by Atlas VPN found that millennials and Gen Z were the most likely age groups to fall for phishing emails.<\/p>\r\n<p>Whether you are about to enter your first or final year of college, it's never too late to brush up on internet safety tips and increase your cybersecurity awareness.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/listings\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Get an education in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover why diversity in cybersecurity matters<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore different cybersecurity careers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What degree do you need to work in cybersecurity?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"comp-and-mobile-security\" id=\"comp-and-mobile-security\"><\/a>\n\n \r\n<h2>Computer and Mobile Security Vulnerabilities<\/h2>\r\n<p>Cybercrime is on the rise worldwide, driven by increased devices, social media use, cloud storage, digital downloads, and mobile and online payments. Consumers' personal and financial data is everywhere, and hackers are getting smarter at retrieving it.<\/p>\r\n<p>Computers and mobile <a href=\"https:\/\/www.cyberdegrees.org\/careers\/vulnerability-assessor\/how-to-become\/\">devices are particularly vulnerable<\/a> to malware, ransomware, and phishing attacks targeting social security numbers, credit card information, and bank account data.<\/p>\r\n<p>The <a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2022\/\" target=\"_blank\" rel=\"noopener\">2022 Cybersecurity Almanac<\/a> reported that with nearly 5.3 billion mobile devices worldwide, security threats are on the rise, with mobile devices accounting for more than 60% of digital fraud.<\/p>\r\n<p>It's more important than ever to take responsibility for the safety of your computer and mobile devices while in college.<\/p>\r\n\r\n\r\n<h3>When You Don&rsquo;t Protect Your Computer and Mobile Phone<\/h3>\r\n<p>Today, hacking is not a question of \"if\" but \"when.\" In 2021 alone, 1,043 schools faced ransomware attacks, <a href=\"https:\/\/www.emsisoft.com\/en\/blog\/40813\/the-state-of-ransomware-in-the-us-report-and-statistics-2021\/\" target=\"_blank\" rel=\"noopener\">reports Emsisoft<\/a>. No matter how secure your university networks claim to be, you must take additional steps to protect your personal devices.<\/p>\r\n<p>Malware, a type of software that gives unauthorized access to systems and devices, was a leading cyberattack method in 2022, according to a <a href=\"https:\/\/upcity.com\/experts\/small-business-cybersecurity-survey\/\" target=\"_blank\" rel=\"noopener\">survey by UpCity<\/a>.<\/p>\r\n<p>To keep your tech safe from cyberattacks, experts recommend installing all software updates, arming yourself with cybersecurity tools like antivirus software, and regularly backing up your data. Remember that hackers don't discriminate. Never assume that hackers won't target your information.<\/p>\r\n<p>Follow these steps to help protect your tech against cybercrime:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Computer and smartphone software updates help patch security flaws and protect data. It's time to stop clicking \"Remind Me Tomorrow\" when your Mac asks to download and install updates. Better yet, turn on automatic updates for all operating systems, devices, and applications, especially your web browsers.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Only download software directly from manufacturers and other trusted sources. Across the web, hackers use convincing fakes (urgent update alerts, download pages, etc.) to spread malware and ransomware to unsuspecting users.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Invest in strong, trusted virus and spyware protection, whether you own a Mac or PC. Scan your computer at least once a week.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Backup your computer periodically to an external hard drive and\/or cloud-based storage system in case you need to recover data and files after a cyberattack.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> When surfing the web, enable pop-up blocking and consider private browsing. Cookies can open security loopholes for hackers, so it's best to delete them periodically.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Ensure valid SSL certificates on websites before entering any credit card or personal information (look for a lock next to the website URL).<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Closely monitor your credit rating, credit cards, and bank accounts. Set up text notifications that alert you to possible fraudulent activity.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3>When You Visit Unsecure or Torrent Websites<\/h3>\r\n<p>While browsing, you might have noticed that some website addresses begin \"HTTP,\" while others start with \"HTTPS.\" That single letter makes a huge difference. HTTPS websites use a Secure Sockets Layer (SSL) connection that encrypts user communications and data, making them more secure for users.<\/p>\r\n<p>Another way to determine if you are visiting a secure website is to look for the lock icon in your browser window. Unsecure HTTP sites enable hackers to view transferred information, including login credentials, in plain text format.<\/p>\r\n<p>Torrent websites like The Pirate Bay host massive digital content repositories, including movies, music, video games, and software. Anyone can access this content at no cost, but torrenting is not risk-free. Dangers include infection from malware, penalties from your internet service provider, and legal settlements from copyright holders.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Do not visit an unsecure website if you can avoid it. If you must visit one, do not enter any sensitive information.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Today's phishing scams use sophisticated replicas of login pages. Before accessing your school email, online learning platform, or bank account, make sure the web address is correct. Never submit sensitive information like usernames, passwords, or credit card numbers through an HTTP website. For example, phishers frequently make fake sites that look like the official PayPal website to get access to users' credentials.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Remember that your online activities can put other students at risk. Cyberattacks that originate on your computer can spread to other devices &mdash; even throughout the entire university system.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Think before you click. You can infect your computer just by clicking on an email link. Type the website into your browser instead of clicking on an embedded link.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Keep your browser, browser extensions, and operating system updated to reduce your risk of being hacked when visiting an unsecure website.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Discard or Sell Old Devices Without Wiping Them Clean<\/h3>\r\n<p>If you get rid of or lose your smartphone or computer without wiping your data, the new owner may be able to access your contacts, texts, social media accounts, and photos. In the hands of a bad actor, the consequences can be very harmful, potentially leading to identity theft.<\/p>\r\n<p>Whether you plan to throw away, resell, recycle, or trade in your old computer or phone, you must take steps to permanently erase your data and ensure it's inaccessible.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Factory-reset your device. If applicable, start by transferring your information to your new device. Then, remove your personal information from the old device. Erase your iPad or iPhone.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Consider downloading antitheft apps or software to help overwrite your data. On a Mac, the built-in Disk Utility app can wipe and overwrite a drive.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Remove or erase your old phone's SIM and micro SD cards.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Instead of reselling on eBay or Facebook Marketplace, consider recycling your old devices directly with the manufacturer. You may even earn credit toward a new replacement.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Avoid taking or storing private photos you would not want other people to see on your devices. No matter how secure you think your files are, someone may still gain access to them.<\/li>\r\n<\/ul>\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-secondary-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"passwords\" id=\"passwords\"><\/a>\n\n \r\n<h2>Password Security Weaknesses<\/h2>\r\n<p>Passwords offer relatively weak protection for personal information and data &mdash; their effectiveness depends on the user. Most of us are guilty of reusing passwords, sharing passwords with others, or writing passwords down in easily accessible locations.<\/p>\r\n<p>Hackers use various techniques to crack passwords, including brute force attacks, phishing, and keylogger software. You may not be able to protect yourself from every method, but poor password habits can make it easy for strangers to access your devices, social media, and financial accounts.<\/p>\r\n\r\n\r\n<h3>When Your Password Is Too Easy<\/h3>\r\n<p>If you use easy-to-guess passwords, you're not alone. Millions of people still rely on notoriously simple combinations like \"123456,\" \"password,\" and \"admin\" to protect their accounts.<\/p>\r\n<p><a href=\"https:\/\/cybernews.com\/security\/weakest-passwords-2022\/\" target=\"_blank\" rel=\"noopener\">Cybernews <\/a>looked at 56 million breached and leaked passwords in 2022 and found that 111,417 cases used the password \"123456.\"<\/p>\r\n<p>When protecting your devices and data, passwords are the first line of defense. The best passwords are longer than eight characters and contain various characters, symbols, and numbers.<\/p>\r\n<p>The <a href=\"https:\/\/ssd.eff.org\/module\/creating-strong-passwords\" target=\"_blank\" rel=\"noopener\">Electronic Frontier Foundation<\/a> recommends using a \"passphrase\" of three or more random words or a password manager like KeePassXC. The most variated 8-character password combinations only take 39 minutes to crack, while the most variated 18-character password combinations take 438 trillion years to crack, according to <a href=\"https:\/\/www.hivesystems.io\/blog\/are-your-passwords-in-the-green\" target=\"_blank\" rel=\"noopener\">Hive Systems<\/a>.<\/p>\r\n\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Check to see if your passwords are still secure. To find out if any of your passwords have been compromised, periodically use services like <a href=\"https:\/\/passwords.google.com\/checkup\/start?pli=1\" target=\"_blank\" rel=\"noopener\">Google's Password Checkup<\/a>.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Avoid using birthdays, family and pet names, locations, and standalone words. Hackers can source this information through social media and dictionaries.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Cybersecurity experts disagree about how often you should change your password. For example, some suggest changing your password every 3 months, while the <a href=\"https:\/\/pages.nist.gov\/800-63-3\/\" target=\"_blank\" rel=\"noopener\">National Institute of Standards and Technology<\/a> (NIST) does not recommend scheduled password changes because it could lead to poor password habits and weaker passwords. However, all best practices recommend changing your passwords immediately after a data breach or if you discover malware.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Enable two-factor authentication when available. It can protect your account from a breach even if a hacker correctly guesses your password.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Store your passwords with care. Do not email lists to yourself, and do not leave documents unprotected in cloud storage. Instead, consider password management apps, password-protected documents, or handwritten hints kept in a secure location (like a locked desk drawer) away from your device.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Use the Same Password for Numerous Sites<\/h3>\r\n<p>We use passwords for everything, and remembering all those passwords can be difficult. Most people know they shouldn't use the same password for multiple accounts, but old habits die hard. A <a href=\"https:\/\/www.ipsos.com\/sites\/default\/files\/ct\/news\/documents\/2022-05\/Google%20Password%20Topline_5.5.2022.pdf\" target=\"_blank\" rel=\"noopener\">2022 Ipsos poll<\/a> conducted for Google found that two in three Americans reuse passwords for different online accounts.<\/p>\r\n<p>We all know the pain of being temporarily locked out of our accounts after guessing too many incorrect combinations. Using the same password across multiple websites is incredibly tempting, but password reuse can pose a major cybersecurity risk.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Do not use the same passwords for all of your accounts. Create unique passwords for your bank, credit card, and school accounts.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> The best way to ensure strong and unique passwords for your accounts is to use a trusted password manager that creates and stores passwords for you. You still need to create and remember one master password that unlocks all the others, but password managers simplify logging into all your accounts. Consider password managers like LastPass, 1Password, or Bitwarden.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> If you don't want to use a password manager, consider using a <a href=\"https:\/\/nordpass.com\/password-generator\/\" target=\"_blank\" rel=\"noopener\">password generator<\/a> to help create unique passwords for each account.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Follow the tips in the previous section to make your passwords hard to crack.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Store Sensitive Data in Contacts on Your Phone<\/h3>\r\n<p>Contact apps store phone numbers, home addresses, email addresses, and birthdays. Information stored in our phone and contacts are protected by our mobile operating systems.<\/p>\r\n<p>However, due to data syncing to cloud servers and other linked applications using this information, it's possible that contact information can be distributed elsewhere. Therefore, it's not a good idea to store your mom's credit card information or your friend's home security code in the \"Notes\" section of their contact page.<\/p>\r\n<p>In a nod to the data privacy concerns that arise with phone contacts, the <a href=\"https:\/\/freedom.press\/training\/blog\/to-protect-your-sources-protect-your-address-book\/\" target=\"_blank\" rel=\"noopener\">Freedom of the Press Foundation<\/a> encourages journalists to protect their sources by securing their online address books. The organization points out that hackers may get access to any of the sensitive data you store on your phone when it backs up to the cloud.<\/p>\r\n<p>You shouldn't try to hide your own sensitive information in Contacts, either. Work on memorizing your social security number instead of disguising it as a phone number under \"Steven St. Nicholas.\"<\/p>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"phishing\" id=\"phishing\"><\/a>\n\n \r\n<h2>Phishing Attacks<\/h2>\r\n<p>Phishing is a hacking method in which fraudulent emails, websites, texts (\"smishing\"), and other forms of electronic communication obtain sensitive information like usernames, passwords, and credit card details. The <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">FBI Internet Crime Complaint Center<\/a> (IC3) reported phishing was the most common cybercrime in 2021, with 323,972 victims that year and over $44 million in losses.<\/p>\r\n<p>Young people often start handling their own finances for the first time in college, taking on the responsibilities of credit cards, loans, and bank accounts. This abundance of sensitive data, combined with inexperience, makes college students an ideal target for phishing attacks. Cybersecurity awareness is the best way to keep yourself safe.<\/p>\r\n\r\n\r\n<h3>When You Follow a Fake Link or Reply to a Fake Email<\/h3>\r\n<p>Phishing emails are a tried-and-true method for hackers to obtain personal or private information. In 2021, phishers targeted U.S. universities by sending emails that tricked recipients into submitting their Microsoft Office 365 credentials on a fake online portal.<\/p>\r\n<p>More recently, since the Biden administration opened the application for student loan forgiveness, college students have been the target of <a href=\"https:\/\/consumer.ftc.gov\/consumer-alerts\/2022\/10\/now-student-loan-debt-relief-application-open-spot-scams\" target=\"_blank\" rel=\"noopener\">student loan debt relief phishing scams<\/a>.<\/p>\r\n<p>These emails claim to be able to put applicants in the front of the line and then ask for payment or personal details like your credit card information or bank account number.<\/p>\r\n<p>Phishing emails typically appear to come from trusted senders and request that you verify banking details, login credentials, or credit card information. These emails may feature the same layout, color scheme, and language of the real entity, and may link to a site specifically designed to spoof the real thing.<\/p>\r\n\r\n<p>Recognize and avoid phishers with the following tips:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> It's a good rule of thumb to distrust every piece of email that lands in your inbox. Double check the email address of the sender for phishing giveaways like a wrong domain or contain misspellings.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Phishing emails often create a false sense of urgency, hoping recipients will ignore the warning signs and engage without thinking. Watch out for emotional messages concerning account suspension, money owed, or limited-time offers.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> These days, most legitimate emails address recipients by name. Be suspicious of impersonal, generic greetings, like \"Dear user,\" or \"Dear valued customer.\"<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If the email includes a link, study the URL carefully. Look for that secure \"HTTPS.\" Rather than clicking the embedded email link, which can immediately give hackers information, independently type the address into your browser to see where it takes you.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Make it more difficult for phishers to get into your account by setting up multi-factor authentication.<\/li>\r\n<\/ul>\r\n\r\n<h3>When You Open an Infected Attachment<\/h3>\r\n<p>Fake emails with infected attachments are a common phishing scam. In some cases, these attachments may be perfectly harmless, but many contain malware and other nasty features, activated with just a click. Using these tools, phishers can steal sensitive information, demand a ransom for the safe return of your data, or even remotely take over your device.<\/p>\r\n<p>For example, a 2022 phishing scam targeting Microsoft Windows users tricked email recipients into downloading a Microsoft Excel attachment that delivers three types of malware. Students received several such emails a week, often with suspicious attachments that they should be careful not to open.<\/p>\r\n<p>Millions of people received an email containing <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2020\/03\/05\/warning-as-this-dangerous-coronavirus-email-is-sent-to-millions-heres-what-you-do\/?sh=4b82bb5a4fe3\" target=\"_blank\" rel=\"noopener\">dangerous coronavirus malware<\/a> in 2020, including 10% of all organizations in Italy. The email got people to inadvertently install a trojan downloader that allowed hackers to steal their private data and spy on them.<\/p>\r\n<p>Review these tips before opening an email attachment:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Treat email attachments with care. Never open one unless you can verify the sender and are expecting the attachment in question. Remember that even trusted email addresses can inadvertently send infected attachments if they've been compromised.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Avoid downloading and installing software sent to you via email. Instead, visit the manufacturer's site for a download.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Verify anything unusual. Double check with the sender before opening an attachment.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If an email seems \"off\" to you, do a quick Google search to see if similar phishing scams have been reported.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If you think you opened a harmful attachment, try updating your computer's security software, running a scan, and removing anything it identifies as a security issue.<\/li>\r\n<\/ul>\r\n\r\n<h3>When You Answer a Suspicious Phone Call<\/h3>\r\n<p>College students love texting and social media, but sometimes we still need to pick up the phone for an old-fashioned call. Phone scams are a popular tactic of phishers looking for financial information, largely because they are proven to work.<\/p>\r\n<p>For example, robocalls cost Americans <a href=\"https:\/\/portal.ct.gov\/AG\/Press-Releases\/2022-Press-Releases\/AG-Tong-Announces-Nationwide-Anti-Robocall-Litigation-Task-Force\" target=\"_blank\" rel=\"noopener\">over $29 billion<\/a> in 2021, according to Connecticut Attorney General, William Tong. In 2022, an international master's student in Canada <a href=\"https:\/\/www.cbc.ca\/news\/canada\/edmonton\/edmonton-international-student-scammed-11k-1.6648287\" target=\"_blank\" rel=\"noopener\">lost nearly $11,000<\/a> to phone scammers who falsely threatened her with deportation for supposed criminal activity, reports CBC.<\/p>\r\n<p>Recently, major mobile carriers, including T-Mobile, AT&amp;T, and Sprint introduced scam protection features to help fight phishing calls.<\/p>\r\n<p>You can see this in action when your caller ID labels an incoming number as \"scam likely\" or \"potential fraud.\" This screening feature checks callers against a database of reported scam numbers.<\/p>\r\n<p>Unfortunately, some phishing calls still slip through. Watch out for scams related to scholarships and financial aid, employment, and student loan debt relief.<\/p>\r\n<p>Protect yourself from suspicious calls with these tips:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Distrust unusual callers, especially those who use an \"unknown number\" ID. Let your voicemail take care of things. Remember that caller IDs can also be spoofed.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Never give out your personal or financial data to someone who calls you. Legitimate university offices will not insist on wire transfers, payment by gift card, or immediate payments over the phone. Government agencies like the IRS never cold call citizens.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If a suspicious caller claims to represent your university, hang up and call the school directly to confirm and follow up.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If you get a call accusing you of a crime and demanding money, hang up. Call the official number for the organization the caller says they represent to find out if the call is legitimate.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If you think you may be the victim of a phone scam, contact your local police to report it immediately.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Follow a Malware Link in a Text<\/h3>\r\n<p>Many phishing attempts depend on tricking the recipient into providing sensitive information. But, more malicious phishing texts can contain links to malwareDouble-check your activity, data, and files without your knowledge.<\/p>\r\n<p>According to a <a href=\"https:\/\/assets-global.website-files.com\/625442b4613eaa38d6514c11\/62712673a07d65fd78c3ca50_robokiller_yearly_phone_report_2021.pdf\" target=\"_blank\" rel=\"noopener\">RoboKiller report<\/a>, over 58 billion spam text messages led to a loss of $10 billion for Americans in 2021.<\/p>\r\n<p>In recent years, hackers have targeted both Apple and Android devices. Once discovered, manufacturers quickly develop software patches that address vulnerabilities and close security loopholes. <br \/><br \/><\/p>\r\n<p>To protect your device from malware:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Avoid clicking on links in text messages. Be suspicious of shortened URLs like bit.ly addresses, which hackers may use to hide a link's true destination.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Do not reply to suspicious texts from companies about your account. Verify the company's phone number before calling them, as spam text messages will often provide a fraudulent phone number.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Keep your phone's software updated to address any security vulnerabilities. Turn on automatic updates when possible.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> If you suspect your device is infected with malware, report the issue to the manufacturer. Forward suspected spam messages to 7726 &mdash; a spam reporting service recommended by the Federal Trade Commission (FTC).<\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-secondary-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"social-media\" id=\"social-media\"><\/a>\n\n \r\n<h2>Social Media Dangers<\/h2>\r\n<p>About 7-in-10 Americans use social media, reports the <a href=\"https:\/\/www.pewresearch.org\/internet\/2021\/04\/07\/social-media-use-in-2021\/\" target=\"_blank\" rel=\"noopener\">Pew Research Center<\/a>. According to their 2021 survey, 76% of 18- to 29-year-olds used Instagram, 75% used Snapchat, and 55% used TikTok.<\/p>\r\n<p>We use social media to stay in touch with new and old friends, entertain ourselves, and explore identities. However, social media use may be linked to anxiety and depression, according to a 2021 <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3919760\" target=\"_blank\" rel=\"noopener\">Social Science Research Network<\/a> paper. College students may also experience harassment and cyberbullying or fall victim to online scams.<\/p>\r\n\r\n\r\n<h3>When You&rsquo;re Harassed, Bullied, or Stalked on Social Media<\/h3>\r\n<p>A 2021 <a href=\"https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/personal-experiences-with-online-harassment\/\" target=\"_blank\" rel=\"noopener\">Pew Research Center<\/a> survey found that about 4-in-10 Americans experienced online harassment, including anything from offensive name-calling and purposeful embarrassment to stalking and physical threats. Even more disturbingly, 64% of U.S. adults under 30 experienced online harassment.<\/p>\r\n<p>Cyberbullying poses a real danger to victims' mental and emotional health. In extreme cases, online harassment and stalking can threaten your physical safety and security. To protect yourself against cyberbullies, consider the following tips:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Refrain from posting personal information on public-facing social media, including your phone number, home address, location, or school's name. Consider making all your accounts private and only accepting invitations from people you know.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Be cautious about posting photos that could allow strangers to identify your location. Disable <a href=\"https:\/\/safeonline.ng\/social-media\/understanding-the-risks-in-geo-tagging\/\" target=\"_blank\" rel=\"noopener\">geotagging<\/a> or location services on all social media platforms.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Use strong passwords for your social media accounts to keep your info safe. Strong passwords are typically 14-16 characters and include a combination of letters, numbers, and symbols.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Frequently check the security settings of your social media accounts.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Avoid sharing details about when you'll be away from home. Burglars may use this information to target your unoccupied residence.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> If you use a public computer, log out of all accounts when you are done.<\/li>\r\n<\/ul>\r\n\r\n<p>If you become the target of cyberbullying or harassment:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='exclamation-circle' type='solid' size='small' color='#1222B6'><\/sonic-icon> Don't respond to cyberbullies or forward their messages.<\/li>\r\n<li><sonic-icon icon='exclamation-circle' type='solid' size='small' color='#1222B6'><\/sonic-icon> Use social media features to cut off the perpetrator. This may include blocking the user, limiting who can view your posts, or increasing your account's privacy settings. In extreme cases, consider deleting your account completely.<\/li>\r\n<li><sonic-icon icon='exclamation-circle' type='solid' size='small' color='#1222B6'><\/sonic-icon> Document the issue by taking screenshots, recording phone calls, and saving emails, texts, and voice messages.<\/li>\r\n<li><sonic-icon icon='exclamation-circle' type='solid' size='small' color='#1222B6'><\/sonic-icon> <a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\" target=\"_blank\" rel=\"noopener\">Report cyberbullying<\/a> to the social media provider, law enforcement, and your school.<\/li>\r\n<li><sonic-icon icon='exclamation-circle' type='solid' size='small' color='#1222B6'><\/sonic-icon> Consider contacting your school's counseling center or a crisis helpline.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You're Hacked Through a Social Media Post<\/h3>\r\n<p>Hackers attack every 39 seconds for an average of 2,244 attacks per day, reports <a href=\"https:\/\/www.securitymagazine.com\/articles\/87787-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noopener\">Security Magazine<\/a>. Phishers and hackers commonly use spoofed accounts, hacked accounts, and fake pages to send and share malicious links disguised as <a href=\"https:\/\/carriekerskie.com\/this-looks-like-you-facebook-scam\/\" target=\"_blank\" rel=\"noopener\">surprising or enticing videos<\/a>, <a href=\"https:\/\/www.pcrisk.com\/removal-guides\/13077-you-are-our-winner-today-pop-up-scam\" target=\"_blank\" rel=\"noopener\">prizes or awards<\/a>, or <a href=\"https:\/\/www.itpro.com\/security\/368621\/hackers-hiding-malicious-links-in-top-google-search-results\" target=\"_blank\" rel=\"noopener\">advertisements<\/a>.<\/p>\r\n<p>Malware ads include links that may lead to fake Facebook sign-in pages asking you to verify your credentials, other websites asking for personal information, or sites with drive-by<a href=\"https:\/\/nordpass.com\/blog\/what-is-drive-by-exploit\/\" target=\"_blank\" rel=\"noopener\"> download<\/a> links. These sites automatically download malware to your device and potentially steal data without your knowledge.<\/p>\r\n<p>Hackers can easily identify your interests and tailor messages, posts, and scams accordingly. They may hijack accounts or create imitations to make you think you're talking to your best friend or sibling. Always stay alert and suspicious.<\/p>\r\n<p>We all want to know what Disney character our profile picture most resembles. Still, the <a href=\"https:\/\/www.bbb.org\/article\/scams\/16992-bbb-scam-alert-bored-think-before-taking-that-facebook-quiz\" target=\"_blank\" rel=\"noopener\">Better Business Bureau<\/a> recommends avoiding Facebook polls and quizzes that require you to give random sites permission to access your account information. You never know where your information might end up.<\/p>\r\n<p>When it comes to social media, the old adage applies: \"If it seems too good to be true, it probably is.\" No one will give you a free car if you like and share a post.<\/p>\r\n\r\n\r\n<h3>When You're Scammed by a Social Media Connection<\/h3>\r\n<p>Students can be scammed &ndash; intentionally or not &mdash; by their social media connections. In 2021, <a href=\"https:\/\/www.mscok.edu\/news\/social-media-scam-announcement\" target=\"_blank\" rel=\"noopener\">Murray State College<\/a> in Tishomingo, Oklahoma announced that scammers targeted students with fake social media pages using the National Junior College Athletic Association's logo. These fake pages claimed to stream the school's athletic events in exchange for students' credit card numbers.<\/p>\r\n<p>Cybercriminals can take advantage of students trying to save money by making financial promises that are too good to be true. Scammers might pretend to be fellow classmates, professors, alumni, or even employees at the financial aid office. Review some tips to protect yourself from social media scams:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Look out for fake online personas or spoofed accounts. Do not provide any personal information before you verify the identity of your social media connection.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Don't believe claims that are too good to be true. If you receive offers of financial assistance, look at them carefully and verify their legitimacy.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Most scholarships and other forms of financial assistance do not ask for processing or application fees. Consider this a red flag.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You're the Subject of Non-Consensual Pornography<\/h3>\r\n<p>Broadly defined, non-consensual pornography is the distribution of private, intimate, or sexually explicit images and videos without consent. Also called \"revenge porn,\" nonconsensual pornography is usually shared by the victim's ex-partner, often as a way to \"get back\" at the victim for perceived wrongdoing after a fight or break up.<\/p>\r\n<p>Personal photos may also be obtained and shared by hackers. According to a <a href=\"https:\/\/psycnet.apa.org\/record\/2019-05961-001\" target=\"_blank\" rel=\"noopener\">2020 study<\/a> by the American Psychological Association, 1-in-12 Americans reported being the victims of revenge porn at least once in their lifetime.<\/p>\r\n<p>As of 2022, 42 states and Washington, DC have specific laws on the books concerning the distribution of revenge porn. Potential penalties vary from <a href=\"https:\/\/criminal.findlaw.com\/criminal-charges\/revenge-porn-laws-by-state.html\" target=\"_blank\" rel=\"noopener\">misdemeanors to felonies<\/a>, with consequences including probation, fines, and\/or imprisonment.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> The only way to entirely protect yourself from nonconsensual pornography is by not taking or sharing intimate photos, even with a trusted partner.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> If you do take intimate photos, store them in an encrypted, password-protected folder on your computer, never in cloud storage. Remember that apps like Snapchat or Instagram can be hacked and monitored remotely.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> If you become a victim of<a href=\"https:\/\/consumer.ftc.gov\/articles\/what-do-if-youre-target-revenge-porn\" target=\"_blank\" rel=\"noopener\"> nonconsensual pornography,<\/a> document and report it to the social media provider and campus police. Consider reaching out to your school's counseling center or the Cyber Civil Rights Initiative&rsquo;s crisis hotline at 844-878-CCRI (2274).<\/li>\r\n<\/ul>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"campus-thefts\" id=\"campus-thefts\"><\/a>\n\n \r\n<h2>Campus Thefts and Scams<\/h2>\r\n<p>If you attend a traditional on-campus <a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-schools\/\">academic program<\/a>, you need to consider more than just basic internet safety. There are other cybersecurity risks to consider when living, working, and studying on a busy college campus. This includes the physical security of your digital devices, the risks of using public computers, and the potential to get hacked on campus.<\/p>\r\n\r\n<h3>When You Don&rsquo;t Secure Your Laptop or Cellphone<\/h3>\r\n<p>It takes only seconds for a thief to swipe your smartphone, tablet, or laptop while you take a bathroom break or grab a coffee.<\/p>\r\n<p>Losing your device could mean losing access to items stored on that device. You would also need to protect your personal information, report the crime to campus police, and spend hundreds of dollars on a replacement. College is hard enough without those hassles.<\/p>\r\n<p>Follow these tips to keep your devices safe:<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Never leave your laptop or other devices unattended in a public place or in your car (even if it's out of sight).<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Always lock your dorm room or apartment when you leave, even if you only plan to be gone for a few minutes.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Invest in a laptop cable lock. Use it in public spaces to help keep your laptop secure.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Register your laptop and phone with the campus security office. The brand, model, and serial number are attached to your name, student ID, and contact information. You might also receive a registration sticker on your device, which can act as a deterrent for thieves.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Enable your devices' built-in tracking features, such as Apple's <a href=\"https:\/\/www.apple.com\/icloud\/find-my\/\" target=\"_blank\" rel=\"noopener\">\"Find My\" app<\/a>, or download a comparable program like <a href=\"https:\/\/preyproject.com\/\" target=\"_blank\" rel=\"noopener\">Prey<\/a> or <a href=\"https:\/\/homeoffice.absolute.com\/\" target=\"_blank\" rel=\"noopener\">Absolute<\/a>.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Regularly backup your devices and files to a cloud storage system and\/or external hard drive. This ensures you always have access to what you need and allows you to remotely erase your devices if stolen.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Do not leave sensitive information on your laptop, like credit card numbers or passwords.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Pick Up an Infected Device on Campus<\/h3>\r\n<p>Do not plug in unknown USBs, laptops, or cell phones into your personal devices.<\/p>\r\n<p>Although some students now store most of their work in the cloud, USB devices are still popular places to save projects and assignments. USBs can contain malware, so putting one into your laptop could have serious consequences.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Distrust any device you find on campus, whether a USB drive, laptop, or cell phone.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Do not plug any unknown devices into your computer in an attempt to identify the owner. Take them to your school's lost and found center or IT department.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> To avoid the risk of infecting devices, avoid sharing USB drives with others, and be cautious when plugging them into public computers. Use security software to scan any device given to you even by a trusted friend.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>When You Use a Communal Workstation<\/h3>\r\n<p>According to a <a href=\"https:\/\/www.educause.edu\/ecar\/research-publications\/ecar-study-of-community-college-students-and-information-technology\/2019\/device-access-ownership-and-importance\" target=\"_blank\" rel=\"noopener\">2018 EDUCAUSE survey<\/a>, about 9% of college students did not have access to a laptop. These students sometimes use their smartphones for school but rely on computer labs, library desktops, and other communal workstations to complete assignments.<\/p>\r\n<p>Even students who own their own devices may rely on campus computers to stay connected, complete research, or do homework in a designated quiet area.<\/p>\r\n<p>When the COVID-19 pandemic shifted most learning online, the option to work in a computer lab disappeared. In response, many universities began giving or loaning laptops to their students to increase equitable access to devices. Still, a personal laptop is not a guarantee at every school.<\/p>\r\n<p>Schools offer protected networks to keep students safe from some cyberthreats, but communal workstations are not entirely without risk. They may expose you to malicious software, infected files, malware, or keyloggers.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> When possible, avoid logging into websites when using public computers. If you need to log in, don't forget to log out before leaving.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Never use a public computer to complete a financial transaction, download software, or visit sketchy websites.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Use private browsing options or clear your browsing data before logging off.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1271E4'><\/sonic-icon> Be aware of your surroundings. <a href=\"https:\/\/www.lifelock.com\/learn-identity-theft-resources-what-is-shoulder-surfing.html#:~:text=%20Here%20are%20three%20other%20ways%20shoulder%20surfers,place%20in%20a%20sea%20of%20cubicles.%20More%20\" target=\"_blank\" rel=\"noopener\">Shoulder surfers<\/a> may try to snag usernames, passwords, and other sensitive information.<\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-secondary-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"off-campus-threats\" id=\"off-campus-threats\"><\/a>\n\n \r\n<h2>Travel and Off-Campus Data Security Threats<\/h2>\r\n<p>College campuses have protected Wi-Fi networks to keep your data safe, but take extra precautions when you travel off campus for vacation, field trips, or a study session at Starbucks.<\/p>\r\n<p>Hackers and other cybercriminals take advantage of public locations because these areas typically provide lax cybersecurity protections, many unsuspecting victims, and relative anonymity.<\/p>\r\n\r\n<h3>When You're Hacked Via Free Wi-Fi<\/h3>\r\n<p>Many don't understand the dangers of using free Wi-Fi. We rely on the internet for countless daily personal and professional tasks.<\/p>\r\n<p>Businesses and other public places know this and often use it to their advantage, offering Wi-Fi connections to attract customers and keep them happy. You can access free Wi-Fi connections in nearly every fast food restaurant, roadside hotel, and airport terminal.<\/p>\r\n<p>Unfortunately, public Wi-Fi is not secure. Convenient connections can hide countless dangers. With free and inexpensive software, cybercriminals can easily snoop on public internet connections, intercept communications, and steal user data. Learn how to <a href=\"https:\/\/consumer.ftc.gov\/articles\/how-safely-use-public-wi-fi-networks#:~:text=Public%20Wi%2DFi%20Isn&#039;t%20Secure,-When%20you&#039;re&amp;text=If%20the%20network%20isn&#039;t,and%20log%20in%20as%20you.\" target=\"_blank\" rel=\"noopener\">safely use public Wi-Fi<\/a> networks with the tips below.<\/p>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Know when and where you're connecting by disabling your devices' ability to connect automatically to nearby Wi-Fi.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Verify the legitimacy of a network before you connect. Hackers may set up their own Wi-Fi connections near trusted businesses to trick unsuspecting users into logging on.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Avoid using public Wi-Fi to shop online, access financial information, or visit sensitive websites. Enable two-factor authentication to protect your social media and email accounts.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Use a free or paid virtual private network (VPN) service to encrypt your data.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Avoid the pitfalls of public Wi-Fi by simply not using it. Consider an unlimited mobile data plan or a portable travel router.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#1222B6'><\/sonic-icon> Don't ignore security warnings from your web browser about potentially dangerous websites or programs.<\/li>\r\n<\/ul>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n \r\n<h2>Internet Safety and Cybersecurity Resources for Students<\/h2>\r\n<p>The <a href=\"https:\/\/www.cyberdegrees.org\/resources\/the-big-list\/\">cybersecurity resources<\/a> below can help you get a handle on internet safety while in school.<\/p>\r\n\r\n\r\n<h3>Internet Safety Groups and Resources<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/consumer.ftc.gov\/identity-theft-and-online-security\/online-privacy-and-security\" target=\"_blank\" rel=\"noopener\">The Federal Trade Commission's Online Privacy and Security<\/a> website explains how to protect your devices and avoid online scams. Resources include explainers on protecting your computer from malware, what to know about romance scams, and how to secure your voice assistant.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noopener\">The National Cybersecurity Alliance<\/a> aims to empower a more secure, interconnected world through education and amplification of cybersecurity awareness. NCSA's website offers resources for online safety, identity theft, account and device security, and privacy management. The site also refers visitors to more than a dozen free security checkups and tools.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/stopthinkconnect.org\/tips-advice\" target=\"_blank\" rel=\"noopener\">Stop. Think. Connect.<\/a> is a global online safety awareness campaign led by NCSA, the Anti-Phishing Working Group, and the U.S. Department of Homeland Security. The campaign's site offers helpful basic safety advice. Users can also access targeted cybersecurity tips, including considerations for LGBTQ online safety, digital wedding planning, and online holiday shopping.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>Advocacy and Support Groups for Online Victims<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> The <a href=\"https:\/\/www.cybercivilrights.org\/\" target=\"_blank\" rel=\"noopener\">Cyber Civil Rights Initiative<\/a> (CCRI) is a nonprofit organization advocating for technological, social, and legal innovation in the fight against online abuse. CCRI primarily focuses on nonconsensual pornography, offering a 24\/7 crisis helpline and links to resources for reporting, removal, and legal assistance.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/withoutmyconsent.org\/resources\/\" target=\"_blank\" rel=\"noopener\">Without My Consent<\/a> is a project headed by the CCRI to empower individuals to understand and stand up for their online privacy rights. The site's extensive resources cover practical topics, including evidence preservation, copyright registration, takedown notices, and emotional support.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> The <a href=\"https:\/\/fightcybercrime.org\/about\/\" target=\"_blank\" rel=\"noopener\">Cybercrime Support Network<\/a> is a nonprofit group that helps individuals and small businesses impacted by cybercrime. The organization also runs <a href=\"https:\/\/www.scamspotter.org\/\" target=\"_blank\" rel=\"noopener\">ScamSpotter.org<\/a>, a website with information to help people avoid internet scams.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>Reporting a Cybersecurity Issue on Social Media or Email<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.facebook.com\/help\/1753719584844061\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/help.instagram.com\/372161259539444\" target=\"_blank\" rel=\"noopener\">Instagram<\/a>, <a href=\"https:\/\/www.snap.com\/en-US\/safety\/safety-center\/\" target=\"_blank\" rel=\"noopener\">Snapchat<\/a>, <a href=\"https:\/\/help.twitter.com\/en\/rules-and-policies\/twitter-report-violation?lang=browser\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>, and <a href=\"https:\/\/support.google.com\/youtube\/answer\/2802027?visit_id=1-636359150850488804-937338553&amp;rd=1\" target=\"_blank\" rel=\"noopener\">YouTube<\/a> offer resources and reporting tools for <a href=\"https:\/\/support.snapchat.com\/en-US\/a\/hacked-howto\" target=\"_blank\" rel=\"noopener\">hacked accounts<\/a> and community guidelines violations, including abusive behavior, inappropriate content, account impersonation, and spam.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/support.google.com\/mail\/#topic=7065107\" target=\"_blank\" rel=\"noopener\">Gmail Help<\/a> provides dozens of articles on account safety and security guidelines. You can also access tools to report <a href=\"https:\/\/support.google.com\/mail\/answer\/8253?hl=en\" target=\"_blank\" rel=\"noopener\">phishing emails<\/a> and other <a href=\"https:\/\/support.google.com\/mail\/contact\/abuse\" target=\"_blank\" rel=\"noopener\">violations of Gmail's policies<\/a>.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> Learn how to keep your <a href=\"https:\/\/support.microsoft.com\/en-us\/account-billing\/how-to-help-keep-your-microsoft-account-safe-and-secure-628538c2-7006-33bb-5ef4-c917657362b9\" target=\"_blank\" rel=\"noopener\">Microsoft email account<\/a> safe and secure. Get instructions on what to do to <a href=\"https:\/\/support.microsoft.com\/en-us\/account-billing\/how-to-recover-a-hacked-or-compromised-microsoft-account-24ca907d-bcdf-a44b-4656-47f0cd89c245\" target=\"_blank\" rel=\"noopener\">recover a hacked account<\/a>.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3>Reporting a Cybersecurity Issue or Crime to the Government<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> The <a href=\"https:\/\/www.ic3.gov\/default.aspx\" target=\"_blank\" rel=\"noopener\">FBI Internet Crime Complaint Center<\/a> (IC3) allows victims of internet crime to file a complaint. The IC3 does not conduct its own investigations. Rather, it reviews submitted information and, when appropriate, forwards it to federal, state, local, or international agencies with jurisdiction. The site also offers tips for internet crime prevention.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/identitytheft.gov\/\" target=\"_blank\" rel=\"noopener\">IdentityTheft.gov<\/a> is the federal government's one-stop resource for identity theft victims. The site offers extensive resources and tools to help you avoid, recognize, report, and recover from identity theft.<\/li>\r\n<li><sonic-icon icon='chevron-double-right' type='solid' size='small' color='#12C7C4'><\/sonic-icon> The IRS will never contact you by email, text, phone call, or social media to request personal or financial information like PINs and passwords. If you receive unsolicited or suspicious contact from someone claiming to be from the IRS, report the incident to the <a href=\"https:\/\/www.treasury.gov\/tigta\/contact_report_scam.shtml\" target=\"_blank\" rel=\"noopener\">Treasury Inspector General for Tax Administration<\/a> and phishing@irs.gov. Learn more about phishing on the <a href=\"https:\/\/www.irs.gov\/privacy-disclosure\/report-phishing\" target=\"_blank\" rel=\"noopener\">IRS website<\/a>.<\/li>\r\n<\/ul>\r\n\r\n\r\n<h3><sonic-icon icon='library' type='solid' size='medium' color='#12C7C4'><\/sonic-icon> Campus Resources<\/h3>\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> Your school's information technology office can help you recover data from a hacked device, provide free security software such as VPNs and antivirus programs, and offer tips and tutorials for cybersecurity awareness and internet safety. Online students may not be able to visit the technology services office in person, but nearly every school offers some level of remote tech support. Always report issues, like phishing emails sent to your school email, to this office.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> Campus police and campus safety departments are in place to protect students, staff, and campus facilities. If you become a victim of cyberbullying, online harassment, or stalking, file a report with campus police. Make sure to supply documentation as evidence, including screenshots, emails, or text messages. Campus safety officers will respond to your allegations and provide tips to protect your digital and physical safety.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> If you face online harassment or cyberbullying, it's important to reach out for emotional support. Student counseling services offer basic services from trained and licensed mental health professionals. Students located on campus can take advantage of one-on-one counseling or group counseling. Many schools also offer online and phone counseling options for students who can't come to campus.<\/li>\r\n<li><sonic-icon icon='minus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> Your school's online student services department can direct you to the right resources if you're an online student.<\/li>\r\n<\/ul>\r\n\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n            <div class=\"mb-12\">\n                      <h2 class=\"heading-1 mb-8\">Additional Resources<\/h2>\n          \n                  <\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1033177256-425x230-c-default.jpg\"\n        alt=\"Cybersecurity Resources for Professionals and Students\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Resources for Professionals and Students<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/the-big-list\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375690\/CyberDegrees.org\/Cyber_Resources_Org_for_Underrep_Populations_383315c58\/Cyber_Resources_Org_for_Underrep_Populations_383315c58.jpg?_i=AA\"\n        alt=\"Cybersecurity Resources for Underrepresented Populations\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Resources for Underrepresented Populations<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-resources-for-underrepresented-populations\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664903872\/CyberDegrees.org\/Woman-smiling-video-call-computer-headphones\/Woman-smiling-video-call-computer-headphones.jpg?_i=AA\"\n        alt=\"Internet Safety Tips While Working From Home\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Internet Safety Tips While Working From Home<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-tips-wfh\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1668625303\/CyberDegrees.org\/Person-smiling-servers-computer-laptop\/Person-smiling-servers-computer-laptop.jpg?_i=AA\"\n        alt=\"Cybersecurity Resources on CyberDegrees.org\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Resources on CyberDegrees.org<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n\r\n\r\n<h2>FAQ About Internet Awareness and Cybersecurity for Students<\/h2>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center -pt-1 -ml-4\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">How can students protect themselves online?<\/mark><\/h3>\r\n            <p>College students can protect themselves online by creating strong passwords, keeping their devices' software up-to-date, and limiting risky behaviors like oversharing personal information and downloading software from unverified sources.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center -pt-1 -ml-4\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">What is digital safety?<\/mark><\/h3>\r\n            <p>Digital safety is another term for internet safety. It includes cybersecurity awareness, methods, and behaviors to reduce cybersecurity risks that can impact your private information, property, and personal well-being.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center -pt-1 -ml-4\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">How can you be safe on social media?<\/mark><\/h3>\r\n            <p>To stay safe on social media, college students should frequently evaluate their privacy and security settings, avoid accepting friend requests from strangers, and carefully consider what they choose to reveal in status updates or photos.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center -pt-1 -ml-4\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">What are five internet safety tips for students?<\/mark><\/h3>\r\n            <p>Create strong, unique passwords for all of your online accounts. Avoid using free Wi-Fi. Do not visit unsecure websites. Install new updates regularly. Keep your social media accounts private.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n            <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center -pt-1 -ml-4\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #E7E9F8\">Why is cybersecurity important for students?<\/mark><\/h3>\r\n            <p>Students spend a lot of their time online, and cyberattacks are increasing. Students who do not take cybersecurity seriously can open themselves up to hacking, identity theft, malware, and scams.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n\r\n<hr style=\"background:  #10e7de; border:0; height:5px; width: 10%\" \/>\r\n\r\n<em><p>Page last reviewed on Dec 9, 2022<\/p><\/em>","protected":false},"excerpt":{"rendered":"Learn about the most common cyber attacks on college campuses, from phishing attempts to social media hacks, and how students can protect themselves.","protected":false},"author":5,"featured_media":2131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":7953,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/394\/revisions\/7953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2131"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=394"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=394"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=394"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=394"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}