{"id":918,"date":"2024-12-20T10:04:44","date_gmt":"2024-12-20T16:04:44","guid":{"rendered":"https:\/\/libraries.ne.gov\/redcloud\/?page_id=918"},"modified":"2024-12-20T10:05:10","modified_gmt":"2024-12-20T16:05:10","slug":"stay-safe-secure-online","status":"publish","type":"page","link":"https:\/\/libraries.ne.gov\/redcloud\/stay-safe-secure-online\/","title":{"rendered":"Stay Safe &amp; Secure Online"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"918\" class=\"elementor elementor-918\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1eb2c01e elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1eb2c01e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-723d270b\" data-id=\"723d270b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b80dd68 elementor-widget elementor-widget-image\" data-id=\"4b80dd68\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1800\" height=\"270\" src=\"https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1.png\" class=\"attachment-full size-full wp-image-890\" alt=\"\" srcset=\"https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1.png 1800w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-300x45.png 300w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-1024x154.png 1024w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-768x115.png 768w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-1536x230.png 1536w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-150x23.png 150w, https:\/\/libraries.ne.gov\/redcloud\/files\/2024\/12\/1-1200x180.png 1200w\" sizes=\"(max-width: 1800px) 100vw, 1800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4eec130d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4eec130d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68bf1008\" data-id=\"68bf1008\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c0879de elementor-widget elementor-widget-text-editor\" data-id=\"3c0879de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Choose a category on the left to find helpful tutorials and resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-662e3f4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"662e3f4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6bcc7a29\" data-id=\"6bcc7a29\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1034d56b elementor-tabs-view-vertical elementor-widget elementor-widget-tabs\" data-id=\"1034d56b\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2711\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2711\" aria-expanded=\"false\">How to Stay Safe Online<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2712\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2712\" aria-expanded=\"false\">Online Identity Theft<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2713\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2713\" aria-expanded=\"false\">Password & Account Safety<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2714\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2714\" aria-expanded=\"false\">What is a Data Breach?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2715\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2715\" aria-expanded=\"false\">Phishing & Other Scams<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2716\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2716\" aria-expanded=\"false\">Where Does My Data Go Online?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2717\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2717\" aria-expanded=\"false\">Using a Password Manager<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2711\" aria-expanded=\"false\">How to Stay Safe Online<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2711\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2711\" tabindex=\"0\" hidden=\"false\"><ul><li aria-level=\"1\"><a href=\"https:\/\/security.berkeley.edu\/resources\/best-practices-how-to-articles\/top-10-secure-computing-tips\"><b>Top 10 Secure Computing Tips<\/b><\/a><b> (UC Berkeley):<\/b> A quick guide to stay safe and secure online.<\/li><li aria-level=\"1\"><a href=\"https:\/\/us.norton.com\/blog\/how-to\/cybersecurity-basics\"><b>Cybersecurity Basics for Beginners<\/b><\/a><b> (Norton):<\/b> Learn about common cybersecurity threats and how to stay safe at home and in the workplace.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.fcc.gov\/smartphone-security\"><b>FTC Smartphone Security Checker<\/b><\/a> <b>(Federal Trade Commission): <\/b>This tool will allow you to choose your mobile operating system and access ten steps to follow to secure mobile devices.<\/li><li aria-level=\"1\">(Handout) <a href=\"https:\/\/www.fcc.gov\/sites\/default\/files\/smartphone_master_document.pdf\"><b>10 Steps to Mobile Security<\/b><\/a><b> (FTC):<\/b> This is a more generalized list for smartphone safety. This could be printed out and taped to a wall near the computer as a reminder.<\/li><li aria-level=\"1\"><a href=\"https:\/\/pixelprivacy.com\/resources\/\"><b>PixelPrivacy Resources<\/b><\/a><b> (PixelPrivacy):<\/b> This collection of resources covers everything from password managers to VPNs and browser safety. Check out the helpful guides and resources.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2712\" aria-expanded=\"false\">Online Identity Theft<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2712\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2712\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/consumer.ftc.gov\/features\/identity-theft\"><b>Recovering from Identity Theft<\/b><\/a> <b>(Federal Trade Commission):<\/b> \u201cOne-stop resource to help you report and recover from identity theft\u201d. This tool will help get back on track.<\/li><li aria-level=\"1\"><a href=\"https:\/\/privacyrights.org\/categories\/identity-theft\"><b>Identify Theft<\/b><\/a><b> (Privacy Rights Clearinghouse): <\/b>This collection of articles will help you reduce your risk of identity theft, properly dispose of records containing personal information, and more.<\/li><li aria-level=\"1\"><a href=\"https:\/\/connectsafely.org\/protect-against-identify-theft\/\"><b>Protect Against Identity Theft<\/b><\/a><b> (ConnectSafely):<\/b> Tips and tricks to stay safe online.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2713\" aria-expanded=\"false\">Password & Account Safety<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2713\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2713\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/lifehacker.com\/use-this-infographic-to-pick-a-good-strong-password-5876541\"><b>Use this Infographic to Pick a Good, Strong Password<\/b><\/a><b> (Lifehacker):<\/b> There are also additional resources at the end of the infographic.<\/li><li aria-level=\"1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb\"><b>Create and Use Strong Passwords<\/b><\/a><b> (Microsoft): <\/b>Use this list as a quick checklist of what to look for in a good password.<\/li><li aria-level=\"1\">(Handout) <a href=\"https:\/\/connectsafely.org\/wp-content\/uploads\/2021\/07\/qg-passwords-2021.pdf\"><b>Tips for Strong, Secure Passwords &amp; Other Authentication Tools<\/b><\/a><b> (ConnectSafely):<\/b> Find more great password and cybersecurity tips and tricks.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2714\" aria-expanded=\"false\">What is a Data Breach?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2714\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2714\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/privacyrights.org\/consumer-guides\/what-do-when-you-receive-data-breach-notice\"><b>What to do During a Data Breach<\/b><\/a><b> (Privacy Rights Clearinghouse):<\/b> Learn what a Data Breach is and how we can take action to protect ourselves.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/data-breach-response-guide-business\"><b>Data Breach Response: A Guide for Businesses<\/b><\/a><b> (FTC):<\/b> Businesses need help preparing for the digital age as well. This guide will help them protect against data breaches.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2715\" aria-expanded=\"false\">Phishing & Other Scams<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2715\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2715\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\"><b>How to Recognize &amp; Avoid Phishing Scams<\/b><\/a><b> (Federal Trade Commission)<\/b><\/li><\/ul><ul><li aria-level=\"1\"><a href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/cyberattacks\/common-cyberattacks\/\"><b>12 Most Common Cyber Threats<\/b><\/a><b> (Crowdstrike)<\/b><\/li><\/ul><ul><li aria-level=\"1\"><a href=\"https:\/\/www.phishing.org\/phishing-examples\"><b>Phishing Examples<\/b><\/a><b> (Phishing.org):<\/b> See examples of Phishing attempts so you know what to look for to stay safe.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-identify-and-protect-yourself-from-an-unsafe-website\/\"><b>How to Identify &amp; Protect Yourself from an Unsafe Website<\/b><\/a><b> (Boston University)<\/b><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2716\" aria-expanded=\"false\">Where Does My Data Go Online?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2716\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2716\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/drive.google.com\/open?id=1y2Ec7-KbbXAiRDqjbKyMucL9B1Uxe4GO\"><b>(Infographic) What Does the Internet Know About Me?<\/b><\/a> This three page infographic tells you what you need to know about where your data goes online.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-data-broker\/\"><b>What is a Data Broker?<\/b><\/a><b> (McAffee):<\/b> Learn how data brokers collect and use your data, and some tips to keep your data safe and as private as possible.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.youtube.com\/watch?v=JAO_3EvD3DY\"><b>(Video) How Facebook Tracks Your Data:<\/b><\/a> The New York Times put together this video about how Facebook tracks and uses data to gather insights about people. Facebook isn\u2019t the only one who tracks people; they are used as an example because they are a larger tech company.<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.wired.com\/story\/wired-guide-personal-data-collection\/\"><b>The Wired Guide to Your Personal Data (and Who is Using it):<\/b><\/a> Wired allows four free articles per user, per month. This is a great resource, but there are others out there as well.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2717\" aria-expanded=\"false\">Using a Password Manager<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2717\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2717\" tabindex=\"0\" hidden=\"hidden\"><ul><li aria-level=\"1\"><a href=\"https:\/\/www.youtube.com\/watch?v=Q0GeMSFGIgI\"><b>(Video) How To Use a Password Manager:<\/b><\/a> This video from The Verge describes how to set up and use a password manager. It uses LastPass as an example, and provides information about security threats.<b><\/b><\/li><li aria-level=\"1\"><a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-password-managers\"><b>The Best Free Password Managers for 2024<\/b><\/a> <b>(PC Magazine)<\/b><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Choose a category on the left to find helpful tutorials and resources. How to Stay Safe Online Online Identity Theft Password &#038; Account Safety What is a Data Breach? Phishing &#038; Other Scams Where Does My Data Go Online? Using a Password Manager How to Stay Safe Online Top 10&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/libraries.ne.gov\/redcloud\/stay-safe-secure-online\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":261,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-onecolumn.php","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-918","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/pages\/918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/users\/261"}],"replies":[{"embeddable":true,"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/comments?post=918"}],"version-history":[{"count":7,"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/pages\/918\/revisions"}],"predecessor-version":[{"id":925,"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/pages\/918\/revisions\/925"}],"wp:attachment":[{"href":"https:\/\/libraries.ne.gov\/redcloud\/wp-json\/wp\/v2\/media?parent=918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}