National Cyber Security Awareness Month

Weekly Highlights

Check back as we progress through each week of National Cyber Security Awareness month for an up to date list on security awareness tip sheets, guides, videos, and more.

Week 1: General Best Practices

NCASM_VideoIcon.png 2 Minute Quick Tips: Mobile Security

DownloadIcon.png Mobile Security: Are You at Risk?

BlogIcon_NoDots.png Welcome to NCSAM!

Week 2: Cybersecurity at Work

NCASM_VideoIcon.png 2 Minute Quick Tips: Phishing Awareness

DownloadIcon.png How to Spot a Phishing Attack

DownloadIcon.png A Successful Data Breach Begins with Employees

Week 3: Connected Communities

 What Anyone can Learn from Social Media in Less than 30 Minutes

 2 Minute Quick Tips: Password Security

Week 4: Your Evolving Digital Life

 Next Cybersecurity Target: Connected Cars

NCASM_VideoIcon.png Watch: What is V2V? 

BlogIcon_NoDots.png US House Proposal Making Cars Less Safe?

Week 5: Next Generation of Cyberprofessionals

 What it Takes to Work in Information Security

Week 5: Training the Next Generation of Cyberprofessionals

Career Spotlight: What it Takes to Work in Information Security

The growing number of data breaches and the increased amount of cyber threats facing companies every day means jobs in information security are on the rise and are continuing to grow. But does the new talent have what it takes to keep us secure? Colleges and Universities don't often integrate security best practices into their programs, leaving a large number of new hires clueless on how to code securely. If you're an aspiring security engineer or analyst, or are a company looking to hire in this field, check out What it Takes to Work in Information Security to learn what attributes and skills you need to become successful in this field.


Week 4: Your Evolving Digital Life

Connected Cars - Are They Secure?

The NCSAM week 4 focus is to educate about emerging threats in cybersecurity. As experts in automotive security, we're taking this time to educate you about security threats associated with connected cars. If you're unfamiliar, connected cars are vehicles that connect to the internet...this could be for anything including GPS use, satallite radio, or for services such as On-Star. Most vehicles made after 2010 are considered connected cars. As cars are becoming more advanced, more technology is being used, and criminals are given more ways to exploit vehicle vulnerabilities. Read our FAQ sheet The Next Cybersecurity Target: Connected Cars to learn more about common risks and concerns with connected car security.

If you're interested in more detailed information on recent chances happening with connected cars and how automakers are dealing with these changes, read our two recent assets on automotive sercurity: Automakers Remain Passive as Government Takes Action and our 2015 Survey: Car Security - What to Automakers Really Think?. You can also register for our webinar on 11/12, going over the findings of the recent survey.

Introduction to Connected Cars: What is V2V?


Week 3: Connected Communities and Families

What a Hacker Can Learn from Social Media in Less than 30 Minutes

Week 3 is all about staying connected while always connected. With our phones, laptops, and tablets, we're always an arms length away from the online world. This week we're focusing on social media. With over 2 billion active social media accounts today, hackers and snoops are using this information to learn more about you. With a little research, nearly anyone can learn your name, address, email address, employer, and more. Learn more about the risks associated with social media safety in our new tip sheet "What Hackers Can Learn from Social Media in Less than 30 Minutes."

Did you know...? One in 10 social media users have said their accounts have been hacked and more than 600,000 Facebook profiles are hacked each day.

2 Minute Quick Tips Video: Password Security


Take the Quiz....How Much do You Know about Online Security?

Online security should be a concern for many people, especially in the workspace. With many employees using their own personal devices for work, the risk increases. How well do you know about online security and does how does your business stack up? Take the quiz to find out.


Week 2: Creating a Culture of Cybersecurity at Work

NCSAM week 2 focuses on cybersecurity at work. Statistics show 52 percent of security breaches start with a negligent employee. That could be anything from downloading malware, opening a malicious email, or not properly protecting their devices with passwords. Here at Security Innovation, we have a whole training program dedicated to information security and privacy awareness, and this week we're sharing some of those tips and best practices to help you stay secure at work.

Why Employees are Your Greatest Security Risk

Nearly every successful cyberattack begins with a simple mistake made by an employee. While most businesses think they're doing enough with endpoint security, it's important to remember that behind every piece of technology is a human ready to make an error. Learn why employees can be the biggest security risk for a company, and some basic tips on how employees can learn to be more aware of the threats around them with this fact sheet "A Successful Cyberattack Often Starts with the Employee."

To take one step further, you can become an expert and learn how to spot a phishing attack with this tip sheet. The most common way for hackers to trick employees is through phishing attacks. By becoming aware of common ways hackers successfully manipulate emails, you can protect yourself from becoming a victim of an attack.

Did you know...? A 2014 survey from EMA states 56 percent of employees have not undergone security awareness training, and those who do often receive it in one singular session.

2 Minute Quick Tips Video: Phishing Attacks


Week 1: Cybersecurity Security Best Practices

Welcome to NCSAM Week 1! This week's theme focuses on best practices for all digital citizens and with mobile devices becoming a large part of our every day lives, we're offering some great tips on mobile security best practices.

Many of us use our phones for both business and personal use. Did you know there are now more mobile users than desktop? The increase in mobile device use means hackers are now targeting mobile devices more often. We've all seen the news: Android attacks, IoS attacks, malware within mobile apps. We're all at risk. This week, we're offering tips on mobile security best practices to help keep you and your device data safe from hackers, and we're starting with a quck tips 2 minute video on mobile security safety!

2 Minute Quick Tips Video: Mobile Security

Did You Know...? Google reports the average mobile user has 36 apps installed on their phone. If one of those apps includes malware, your data could be at risk!

Mobile Security: Are You At Risk?

There are more mobile users online today then ever before. Most people always have their mobile phones within an arms reach away. People are using mobile devices for work, games, social media, shopping, and the list keeps going on. As people depend on their mobile devices more often, hackers rely on users not securing their devices to steal passwords, personal data, and other sensitive information.

Device loss or theft is one of the most common ways for hackers steal data. You may also find malware hidden in downloaded apps. With the increase in mobile threats on Android and iOS devices, users need to take security precautions to help protect personal data. Read our fact sheet on "Mobile Security: Are You at Risk?" to learn about the most common ways hackers attack mobile devices and what you can do to help secure your data.


Security Innovation is cyberaware and wants you to be too!

Security Innovation is excited to take part in National Cyber Security Awareness Month (NSCAM). As a NCSAM Champion and leader in security awareness training and security application assessments, we'd like to share our expertise with you and take this time to bring awareness to the growing number of cyber threats and trends we're seeing in today's digital world. We'll be providing new assets every week, including tips, best practices, guides, videos, and more, so don't forget to check back for updates or sign up to have the updates sent directly to you.

National Cyber Security Awareness Month (NCSAM) – celebrated every October since 2003  was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join us this month as we promote the importance of staying secure online!

Stay Up to Date on NCSAM News

Follow us on social:
Sign Up for NCSAM Updates:


 Register for Our Upcoming Webinar >>

10/29: The Future of Cybersecurity

Join Danny Harris, Senior Security Consultant, as he discusses the future of cybersecurity covering a range of NCSAM topics. Click to Register!