Are You #CyberAware? Find Out During National Cybersecurity Awareness Month

Every October, a crucial reminder of the ever-increasing importance of Cybersecurity is brought to us via National Cybersecurity Awareness Month (NCSAM) under the leadership of the U.S. Department of Homeland Security and the National Cyber Security Alliance. The program, now in its 14th year, was created “as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.” Here, we’ve toplined each week’s theme below to help make it a little more digestible!

Twitter ΓÇô Happy NCSAM.png

Simple Steps to Online Safety

The first week’s theme is dedicated to top consumer cyber concerns, steps to protect against them, and what to do if you fall victim to cybercrime. The bottom line is, there are actions everyone can take to protect their online identities and information. The six main steps are:

1) Keep a Clean Machine

2) Protect Your Personal Information

3) Connect with Care

4) Be Web Wise

5) Be a Good Online Citizen

6) Own Your Online Presence.

STOP. THINK. CONNECT.™, the global online safety awareness campaign to help all digital citizens stay safer and more secure online, breaks down each of these steps in a short series of easy-to-follow tips and advice at

 Cybersecurity in the Workplace is Everyone’s Business

Businesses of all types and sizes can protect themselves, their employees and their customers against cyber threat. For example, organizations such as the National Institute of Standards and Technology Cybersecurity Framework exist as resources to help businesses strengthen their cyber resilience. The National Cyber Security Alliance (NCSA) has established CyberSecure My Business™, a comprehensive national program designed to help businesses learn how to be safer and more secure online. The NCSA has translated the framework for the program into simpler language, and incorporated it into an introductory-level series of in-person, highly interactive workshops, as well as webinars. Ultimately, the framework is broken down into the following steps:

Identify – assess the cybersecurity risks to your organization.

Protect – implement a cybersecurity plan for your business, protect your customers and train your employees to guard against cyber threats.

Detect – awareness of key threats will enable you to employ practices and behaviors that limit your company’s risk.

Respond – if your business has been victimized by a cyber attach, notify the appropriate authorities, work to recoup your losses and ensure attackers are brought to justice.

Recover – make your business more cybersecure by employing the appropriate recovery efforts that follow response to a cyber incident.

Today’s Predictions for Tomorrow’s Internet

Today’s reality is digital, and there’s no sign of change on the horizon. Nearly everything is online or “connected” in one form or another. The third week of this year’s NCSAM celebration was dedicated to reminding citizens that personal information is the data that fuels smart devices. While there are tremendous benefits of this technology, it is critical to understand how to use these cutting-edge innovations in safe and secure ways. While it brings with it many benefits, as with almost anything, misusing it or acting carelessly can — and often does — have consequences. This infographic offers tips on security precautions you and your family can take to connect to the internet responsibly and with more peace of mind.

The Internet Wants YOU: Consider a Career in Cybersecurity

Week four touts the opportunities in the professional field of cybersecurity. According to The SANS Institute, approximately 350,000 open cybersecurity positions went unfilled in 2016; that number is expected to grow to more than 500,000 in the U.S. by 2021. Student and other job seekers interested in exploring cybersecurity careers are encouraged to test your cybersecurity aptitude with the SANS CyberTalent Aptitude Assessment and see if cybersecurity might be a good career choice for you. The 30-question assessment focuses on the three core elements of aptitude: Comprehension, Problem Solving Skills, and Knowledge Application.

 Building Resilience in Critical Systems

The final week of NSCM focuses on the importance of critical infrastructure and highlights the roles the public can play in protecting it from cyber threats. According to Homeland Security, critical infrastructure provides “the essential services that underpin American society and serve as the backbone of our nation’s economy, security, and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, the stores we shop in, and the communication systems we rely on to stay in touch with friends and family.” Most, if not all these things rely on the internet in one way or another. NSCM looks at cybersecurity in relation to keeping all of these things operational and secure.

While taking proper precautions is a vital part of protecting yourself online at all times, NVE Bank customers can rest assured that they are protected when banking with us online. Security is a top priority when it comes to our customers’ financial and personal information. Our online security measures include the latest industry-accepted standards and practices. You can find out more by reading our online security commitment.

To learn about products and services offered by NVE Bank, visit our website. You can also visit your convenient neighborhood branch, or call us at 1-866-NVE BANK (683-2265).


About NVE Bank

The NVE Blog should not be used for banking purposes relating to NVE Bank. Please do not disclose any personal or business banking information on this site. NVE is an Equal Opportunity Lender, Equal Housing and Member FDIC. Visit NVE Bank, established in 1887, offers an extensive range of personal and business products and services. The Bank maintains 11 offices conveniently located throughout Bergen County. For more information, please call our toll-free number 1-866-NVE-Bank (683-2265) or visit our website at
This entry was posted in cyber security, Uncategorized and tagged , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s