#TeamRhino #SaveTheRhino #SaveFive

Raising Awareness to protect our #WildLife, Please take the pledge: I would like to join #TeamRhinodotorg in the fight against rhino poaching to ensure a future for people and vulnerable wildlife on our planet: I will never buy or promote any products made of rhino horn, as I know that demand drives poaching. I will be a committed advocate to support rangers and others on the frontlines of rhino conservation. I will share my passion about rhino conservation and recruit my friends and family to become involved. I will urge my government to continue championing efforts to stop rhino poaching at home and abroad. I will stand with IRF to help save rhinos from extinction. teamrhino.org

Tuesday, March 14, 2023

Cybersecurity Challenge with Code.org #QuadCyberChallenge

 


Cybersecurity is about staying safe when on our technology devices at home, on the go or for work. Protecting your data isn't hard to do. i will share what i'm learning and practicing in a series of blogs because being safe on the internet is important when trying to connect to resources. 


Apeil 10 - 14th. The Quad Cyber Challenge is a great way to get more people to understand protecting their data while online. The series of blogs will come from the checklist activity for the Quad Cyber Challenge




We are in the "Information Age" were "Malicious cyber actors are constantly seeking ways to exploit any opportunity to get in your systems, such as through out-of-date software, unsecure apps that leave your data exposed, or easy-to-guess passwords."


Here are four simple steps everyone should take to enhancecybersecurity at home and in the workplace:
  • Think Before You Click: Recognize and Report Phishing: If a link looks a little off, think before you click. It could be an attempt to get sensitive information or install malware.


  • Update Your Software: Don't delay -- If you see a software update notification, act promptly. Better yet, turn on automatic updates. This process of protecting your data is important and should not be put off. 


  • Use Strong Passwords/Passphrases: Use passwords that arelong, unique, and randomly generated. Use password managersto generate and remember different, strong passwords for eachof your accounts. A password manager will encrypt passwordssecuring them for you!
  • This is how a password manager works

    Intelligent programs that generate secure passwords and store data in a secure digital vault are used in many private homes and companies. The software has an intelligent and secure algorithm and can generate new passwords at the touch of a button. Users can set various options themselves or use the default settings. You can decide on the length of the passwords, upper and lower-case letters, numbers, and special characters. With one click of the mouse, the password manager creates an extremely secure password that cannot even be cracked by an experienced hacker.

    The program stores the passwords and other registration data in a secure database, an SSL-encrypted vault. The password manager can securely store online registration data, passwords, payment details, and other personal information. Users can access their stored data from any device with the cloud functionality and automatic synchronization; however, only after users enter their unique master password.

    The automatic form filler saves a lot of time.

    On the one hand, every program creates secure passwords, while on the other hand managing all the data. Which other features are available differs among the password managers. Many developers continuously improve their software and add new, useful features. The automatic form filling function is both particularly handy and time-saving. Such forms can be found on almost all websites. With every online order, names, addresses, and many other fields must be filled in: a laborious, manual process. The password manager completely takes this off users’ hands, saving them a lot of time. All important registration information and passwords are stored in the secured database. In combination with a browser extension, the password manager can automatically fill in these data on all websites.

    Set-up and use

    1. Installation of the password manager
    2. Setting up the browser extensions
    3. Setting up the user account
    4. Generating a secure master password (must not be forgotten)
    5. Importing all data from the browsers
    6. Optional installation of a mobile app
    7. Additional security by means of two-factor authentication (if available)
    8. Local data backup or in the cloud

    Why no one should do without a password manager

    A password manager is inexpensive and the small investment already bears fruits after a short period of time. Purchasers benefit from secure passwords and no longer have to remember them themselves. To access the encrypted database, they always have to enter their master password to then access the stored data from numerous devices. Surfing the Internet becomes significantly more comfortable and secure when forms are filled in automatically.  .https://www.password-manager-comparison.com/lp/the-best-password-managers-us/?source=b&adw-cpn=password-c&c=2840&msclkid=7632f2536d2c146bc39f9643fa9b2e08

  • Enable Multi-Factor Authentication: You need more than a password to protect your online accounts, and enabling MFAmakes you significantly less likely to get hacked 


i'm working on hosting some workshops on cybersecurity with Urban Tech Fair because we all have a role in protecting ourselves and our families while online!!  

the next blog will explore The Tor Project and how they promote safe internet use!! 

please consider sharing this information with your networks!!

  #cyberchallenge #codedotorg #redhenexploring2023 #hov1and2stronger #socialjusticestopstheviolencebridgingthedigitaldivide #quadcyberchallenge

CyberChallenge Checklist:

  https://www.cyberchallenge.tech/_files/ugd/81e583_5e7039a59484499889494a9bd2a93d5a.pdf