Our daily lives depend on the 16 sectors of critical infrastructure, which supply basics like food, water, financial services, healthcare, communications and power, to millions and millions of Americans.
A disruption to these systems, which are often interconnected and sometimes Internet facing, can have significant and even catastrophic consequences for our country. Week 4 of National Cybersecurity Awareness Month (NCSAM) will emphasize the importance of securing our critical infrastructure and highlight the roles both individuals and organizations play in helping to protect these networks and systems from cyber threats.
As technology providers become more and more focused on finding ways to help keep our nation’s systems safe, they are striving to develop security protection across the entire technology stack. With increased connectivity across all industries, it is important that government and industry work together to address the needs of critical infrastructure.
Technology companies are regularly partnering with government organizations to provide security guidance. For example, Intel is among a handful of select companies that collaborated with NIST’s National Cybersecurity Center of Excellence (NCCoE) to provide authentication solutions for government workers who use mobile devices.
Along with many peers, Intel is focused on developing solutions that help mitigate security concerns for the government. No one company, government agency, nonprofit or individual can do it alone: cybersecurity is “Our Shared Responsibility”.
As NCSAM comes to a close, NCSA recommends taking the following easy steps to help protect yourself, your information and the greater community:
- Keep a clean machine: Keep all software on internet-connected devices – including PCs, smartphones and tablets – up to date to reduce risk of infection from malware.
- Lock down your login: Fortify your online accounts by enabling strong authentication tools, such as biometrics or a unique one-time code through an app on your mobile device. Your usernames and passwords may not be enough to protect key accounts like email, banking and social media.
- When in doubt, throw it out: Cybercriminals often use links in email, social posts and texts to try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
For more tips and information about how you connect daily with critical infrastructure, take a look at our infographic.