Cyber Survival Guide Logo
Cyber Survival Guide Logo
Cyber Survival Guide Logo

The spirit of adventure beckons you online!

The spirit of adventure beckons you online!

The spirit of adventure beckons you online! You have funny GIFs to find, emails to ignore, pants to buy. But perils lurk in the dark corners of the web. Even when you try to maintain good habits, you can encounter packs of cybercriminals and malicious software.   
What is there to do? Don't despair! We’re here to help! Use the following as a survival guide for when you think you downloaded a virus, when you suspect an online account has been hacked, you’ve lost control of a social media account, your sensitive data was lost in a data breach, or a cybercriminal is threatening you with ransomware.  

Remember, with all these situations, the most common way hackers get access to your private digital life is through phishing – no, not the kind at a lake. Keeping calm and collected when a suspicious message slithers into your inbox helps stop a hacking attempt before the hook is set. We’ll give you tips to avoid the bait! 
The spirit of adventure beckons you online! You have funny GIFs to find, emails to ignore, pants to buy. But perils lurk in the dark corners of the web. Even when you try to maintain good habits, you can encounter packs of cybercriminals and malicious software.   
What is there to do? Don't despair! We’re here to help! Use the following as a survival guide for when you think you downloaded a virus, when you suspect an online account has been hacked, you’ve lost control of a social media account, your sensitive data was lost in a data breach, or a cybercriminal is threatening you with ransomware.  

Remember, with all these situations, the most common way hackers get access to your private digital life is through phishing – no, not the kind at a lake. Keeping calm and collected when a suspicious message slithers into your inbox helps stop a hacking attempt before the hook is set. We’ll give you tips to avoid the bait! 
Hacked Account Background

How To Survive A Hacked Account

Fearless internet explorers, you can reclaim online accounts even if a hacker sneaks in! With some quick, sure-footed action, shoo cybercriminals out of your social media, email, or other account.

Hacked Account Background

How To Survive A Hacked Account

Fearless internet explorers, you can reclaim online accounts even if a hacker sneaks in! With some quick, sure-footed action, shoo cybercriminals out of your social media, email, or other account.

Hacked Account Background

How To Survive A Hacked Account

Fearless internet explorers, you can reclaim online accounts even if a hacker sneaks in! With some quick, sure-footed action, shoo cybercriminals out of your social media, email, or other account.

Hacked Social Media Background

How To Survive A Hacked Social Media Account

For many of us online, social media is how we unzip our tent flaps and enjoy the beauty of the online world. Losing control of a social media account is like annoying hacker mosquitos invading your digital tent! Here are our tips to get it back.

Hacked Social Media Background

How To Survive A Hacked Social Media Account

For many of us online, social media is how we unzip our tent flaps and enjoy the beauty of the online world. Losing control of a social media account is like annoying hacker mosquitos invading your digital tent! Here are our tips to get it back.

Hacked Social Media Background

How To Survive A Hacked Social Media Account

For many of us online, social media is how we unzip our tent flaps and enjoy the beauty of the online world. Losing control of a social media account is like annoying hacker mosquitos invading your digital tent! Here are our tips to get it back.

Ransomware Background

How To Survive A Ransomware Attack

Unlike white-water rafting, ransomware is an adrenaline rush no one wants to have. Here are some techniques to take on digital hostage-takers.

Ransomware Background

How To Survive A Ransomware Attack

Unlike white-water rafting, ransomware is an adrenaline rush no one wants to have. Here are some techniques to take on digital hostage-takers.

Ransomware Background

How To Survive A Ransomware Attack

Unlike white-water rafting, ransomware is an adrenaline rush no one wants to have. Here are some techniques to take on digital hostage-takers.

Phishing Background

How To Survive A Phishing Attempt

Most Of The Unfortunate Events Described In This Guide Are Caused By Phishing Attacks, Which Is When A Cybercriminal Sends You An Email, Message, Social Media Post, Or Text That Includes A Malicious Download Or Link.

Phishing Background

How To Survive A Phishing Attempt

Most Of The Unfortunate Events Described In This Guide Are Caused By Phishing Attacks, Which Is When A Cybercriminal Sends You An Email, Message, Social Media Post, Or Text That Includes A Malicious Download Or Link.

Phishing Background

How To Survive A Phishing Attempt

Most Of The Unfortunate Events Described In This Guide Are Caused By Phishing Attacks, Which Is When A Cybercriminal Sends You An Email, Message, Social Media Post, Or Text That Includes A Malicious Download Or Link.

Computer Virus Background

How To Survive A Computer Virus

Viruses and malware are very real hazards swarming around the internet, but you can bushwhack them away with concerted action and a quality antivirus program. Be proactive to keep viruses from making your device sick!

Computer Virus Background

How To Survive A Computer Virus

Viruses and malware are very real hazards swarming around the internet, but you can bushwhack them away with concerted action and a quality antivirus program. Be proactive to keep viruses from making your device sick!

Computer Virus Background

How To Survive A Computer Virus

Viruses and malware are very real hazards swarming around the internet, but you can bushwhack them away with concerted action and a quality antivirus program. Be proactive to keep viruses from making your device sick!

How To Survive A Data Breach

Unlike a postcard, nobody likes receiving a letter about their data being lost in a data breach. When you find out your data might have been compromised in a breach, act fast.

How To Survive A Data Breach

Unlike a postcard, nobody likes receiving a letter about their data being lost in a data breach. When you find out your data might have been compromised in a breach, act fast.

How To Survive A Data Breach

Unlike a postcard, nobody likes receiving a letter about their data being lost in a data breach. When you find out your data might have been compromised in a breach, act fast.

Stay safe online by being prepared

Stay safe online by being prepared

As with most things, preventing a cyberattack is easier than dealing with the fallout in many cases. By practicing some good cyber hygiene behaviors, you can stay on the trail headed to amazing internet experiences!  
As with most things, preventing a cyberattack is easier than dealing with the fallout in many cases. By practicing some good cyber hygiene behaviors, you can stay on the trail headed to amazing internet experiences!  

2

Back up your data regularly to the cloud or an external drive (or both!) 
Back up your data regularly to the cloud or an external drive (or both!) 

3

Antivirus software is worth it.
Antivirus software is worth it.

4

Update your software regularly (turning on automatic updates is easiest!) 
Update your software regularly (turning on automatic updates is easiest!) 

Common symptoms of a computer virus:

Common symptoms of a computer virus:

As with most things, preventing a cyberattack is easier than dealing with the fallout in many cases. By practicing some good cyber hygiene behaviors, you can stay on the trail headed to amazing internet experiences!  
As with most things, preventing a cyberattack is easier than dealing with the fallout in many cases. By practicing some good cyber hygiene behaviors, you can stay on the trail headed to amazing internet experiences!  
  • Suddenly slow computer performance
  • Computer unexpectedly
shutting down
or restarting
  • Overworked hard drive
causing your computer's 
internal fan to run often
  • Frequent 
system 
crashes
  • Missing 
files
  • Lagging web browser 
or your web browser 
constantly redirects
  • Unknown applications 
that appear without 
you downloading them
  • Malfunctioning 
antivirus programs 
or firewalls
  • Frequent error 
messages and unexpected 
pop-up windows

Merit Badges

Merit Badges

Congratulations! You now know how to survive all kinds of cyber attacks. Download and share your digital merit badges below or award them to employees as they read the guides!
Congratulations! You now know how to survive all kinds of cyber attacks. Download and share your digital merit badges below or award them to employees as they read the guides!
Data Breach Badge
Data Breach Badge
Data Breach Badge
Hacked Account Badge
Hacked Account Badge
Hacked Account Badge
Phishing Badge
Phishing Badge
Phishing Badge
Ransomware Badge
Ransomware Badge
Ransomware Badge
Hacked Social Media Badge
Hacked Social Media Badge
Hacked Social Media Badge
Computer Virus Badge
Computer Virus Badge
Computer Virus Badge

SHARE ONLINE WITH THE POSTS BELOW!

  • Always bring a survival guide when wandering into uncharted territory - especially online. And hey, we have a free one for you! Download the #CyberSurvivalGuide!

  • Hackers use tasty, convincing bait in their phishing attempts. Don’t fall for it - stay vigilant, and don’t get hooked! #CyberSurvivalGuide

  • In case of a ransomware attack, wave your arms in the air to make yourself look bigger. If that doesn’t work, turn to the #CyberSurvivalGuide for tips on what to do next.

  • Viruses like to hitchhike. If you happened to pick one up and it’s too late to drop it off, pull out the #CyberSurvivalGuide.

SHARE ONLINE WITH THE POSTS BELOW!

  • Always bring a survival guide when wandering into uncharted territory - especially online. And hey, we have a free one for you! Download the #CyberSurvivalGuide!

  • Hackers use tasty, convincing bait in their phishing attempts. Don’t fall for it - stay vigilant, and don’t get hooked! #CyberSurvivalGuide

  • In case of a ransomware attack, wave your arms in the air to make yourself look bigger. If that doesn’t work, turn to the #CyberSurvivalGuide for tips on what to do next.

  • Viruses like to hitchhike. If you happened to pick one up and it’s too late to drop it off, pull out the #CyberSurvivalGuide.