Harris County Logo

Protect yourself against cyber crimes

Harris County Texas Homeland Security and Emergency Management.

Cyberattacks are attempts to access or damage a computer or network system. This can lead to the loss of money, or theft of personal, financial, and medical information. Cyberattacks are acts of terrorism. As terrorist attacks often take place without warning, residents should maintain a high level of vigilance and take appropriate proactive steps to increase security awareness.

To protect yourself against a cyberattack, consider the following recommendations:

Passwords play a huge role in keeping you safe. Use strong passwords by including upper and lower-case letters, numbers, and special characters. If possible, use two methods of verification. Also, don’t write down your passwords and leave them near your device.

It is also recommended that you don’t share your passwords or PINs. If possible, use your device’s fingerprint scanner or facial recognition capabilities and change your passwords regularly.

Next, remember to always use secure Internet connections and Wi - Fi networks.

To further protect your device, use antivirus and anti-malware solutions and firewalls to block threats.

Now, you may be tempted, but think before you click! You may receive an amazing offer or a request that requires immediate action. Stop! Do you know the person or entity sending the information? This could be a scam. We all know that scammers prey on people’s fears so stay calm and composed. Do not give out personal or financial information that can compromise you.

Another thing to remember is that government agencies will not call, text, or contact you via social media about any debt or unclaimed money you may have. Be careful and don’t provide payment or personal information. If you’re not sure, contact the government agency directly.

You also want to make it a habit to check your bank statements, credit card statements, and credit reports regularly.

Finally, back up your files regularly in an encrypted file or encrypted file storage device.

If you believe you have been a victim of a cyberattack, you should: