{"id":134,"date":"2024-11-01T14:59:19","date_gmt":"2024-11-01T14:59:19","guid":{"rendered":"https:\/\/libraries.ne.gov\/siouxcounty\/?page_id=134"},"modified":"2024-11-01T15:27:00","modified_gmt":"2024-11-01T15:27:00","slug":"stay-safe-amp-secure-online","status":"publish","type":"page","link":"https:\/\/libraries.ne.gov\/siouxcounty\/stay-safe-amp-secure-online\/","title":{"rendered":"Stay Safe &amp; Secure Online"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"134\" class=\"elementor elementor-134\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d10519 e-con-full e-flex e-con e-parent\" data-id=\"5d10519\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45afd9d elementor-widget elementor-widget-heading\" data-id=\"45afd9d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Stay Safe &amp; Secure Online<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05c1566 e-con-full e-flex e-con e-parent\" data-id=\"05c1566\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-379dc8e elementor-widget elementor-widget-text-editor\" data-id=\"379dc8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Click on a topic to the left to find tutorials and resources to stay safe and secure online.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49dfa070 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"49dfa070\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45a8be5e\" data-id=\"45a8be5e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41ca412e elementor-tabs-view-vertical elementor-widget elementor-widget-tabs\" data-id=\"41ca412e\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1101\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1101\" aria-expanded=\"false\">How to Stay Safe Online<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1102\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1102\" aria-expanded=\"false\">What is Online Identity Theft?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1103\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1103\" aria-expanded=\"false\">Password & Account Safety<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1104\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1104\" aria-expanded=\"false\">What is a Data Breach?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1105\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1105\" aria-expanded=\"false\">What is Phishing?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1106\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1106\" aria-expanded=\"false\">Where Does My Data Go Online?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1107\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1107\" aria-expanded=\"false\">Which Websites are Safe?<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1108\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1108\" aria-expanded=\"false\">Using a Password Manager<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1101\" aria-expanded=\"false\">How to Stay Safe Online<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1101\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1101\" tabindex=\"0\" hidden=\"false\"><ul><li><a href=\"https:\/\/security.berkeley.edu\/resources\/best-practices-how-to-articles\/top-10-secure-computing-tips\"><b>Top 10 Secure Computing Tips:<\/b><\/a> Tips from UC Berkeley for how to stay safe and secure online.\u00a0\u00a0\u00a0<\/li><li><a href=\"https:\/\/us.norton.com\/internetsecurity-how-to-cyber-security-best-practices-for-employees.html\"><b>10 Cybersecurity best practices that every employee should know:<\/b><\/a> Norton offers this top ten list geared towards businesses. \u00a0\u00a0\u00a0 This could be helpful for entrepreneurship and small businesses classes. \u00a0\u00a0\u00a0<\/li><li><a href=\"https:\/\/www.fcc.gov\/smartphone-security\"><b>FTC Smartphone Security Checker:<\/b><\/a> This tool will allow you to choose your mobile operating system and access ten steps to follow to secure mobile devices. \u00a0\u00a0\u00a0 This is from the Federal Trade Commission (FTC).<\/li><li><a href=\"https:\/\/www.fcc.gov\/sites\/default\/files\/smartphone_master_document.pdf\"><b>10 Steps to Mobile Security:<\/b><\/a> This is a more generalized list for smartphone safety from the FTC. This could be printed out and taped to a wall near the computer as a reminder.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1102\" aria-expanded=\"false\">What is Online Identity Theft?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1102\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1102\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft\"><b>Recovering from Identity Theft<\/b><\/a> <b>(Federal Trade Commission):<\/b> \u201cOne-stop resource to help you report and recover from identity theft\u201d. This tool will help get back on track after identity theft.<\/li><li><a href=\"https:\/\/privacyrights.org\/categories\/identity-theft\"><b>Identify Theft<\/b><\/a><b> (Privacy Rights Clearinghouse): <\/b>This collection of articles will help you reduce your risk of identity theft, properly dispose of records containing personal information, and more.<\/li><li><a href=\"https:\/\/www.connectsafely.org\/protect-against-identify-theft\/\"><b>Protect Against Identity Theft<\/b><\/a><b> (ConnectSafely):<\/b> Tips and tricks to stay safe online.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1103\" aria-expanded=\"false\">Password & Account Safety<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1103\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1103\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/lifehacker.com\/use-this-infographic-to-pick-a-good-strong-password-5876541\"><b>Use this Infographic to Pick a Good, Strong Password<\/b><\/a><b> (Lifehacker):<\/b> There are also additional resources at the end of the infographic.\u00a0\u00a0\u00a0<\/li><li><a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2018\/03\/27\/Creating-and-Managing-Strong-Passwords\"><b>Creating and Managing Strong Passwords<\/b><\/a><b> (Department of Homeland Security): <\/b>Use this list as a quick checklist of what to look for in a good password.<\/li><li><a href=\"https:\/\/www.connectsafely.org\/passwords\/\"><b>Tips for Strong, Secure Passwords &amp; Other Authentication Tools<\/b><\/a><b> (ConnectSafely):<\/b> Find more great password and cybersecurity tips and tricks.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1104\" aria-expanded=\"false\">What is a Data Breach?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1104\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1104\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/what-do-when-you-receive-data-breach-notice\"><b>What to do During a Data Breach:<\/b><\/a> The Privacy Rights Clearinghouse outlines what a Data Breach is and how we can take action to protect ourselves.<\/li><li><a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/data-breach-response-guide-business\"><b>Data Breach Response: A Guide for Businesses:<\/b><\/a> Businesses need help preparing for the digital age as well. This guide will help them protect against data breaches.<\/li><li><a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/what-do-when-you-receive-data-breach-notice\"><b>What do Do When You Receive a Data Breach Notice:<\/b><\/a> The Privacy Rights Clearinghouse built this guide to help you respond to different kinds of data breaches.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1105\" aria-expanded=\"false\">What is Phishing?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1105\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1105\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\"><b>How to Recognize &amp; Avoid Phishing Scams<\/b><\/a><b> (Federal Trade Commission)<\/b><\/li><li><a href=\"https:\/\/www.symantec-norton.com\/11-most-common-computer-security-threats_k13.aspx\"><b>11 Most Common Computer Security Threats&#8230;and what you can do to protect yourself from them:<\/b><\/a> The title says it all. From Norton Symantec, a well-known security company.<br \/><a href=\"https:\/\/www.phishing.org\/phishing-examples\"><b>Phishing Examples<\/b><\/a><b> (Phishing.org):<\/b> See examples of Phishing attempts and find other resources.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1106\" aria-expanded=\"false\">Where Does My Data Go Online?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1106\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1106\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/drive.google.com\/open?id=1y2Ec7-KbbXAiRDqjbKyMucL9B1Uxe4GO\"><b>(Infographic) What Does the Internet Know About Me?<\/b><\/a> This three page infographic tells you what you need to know about where your data goes online.<\/li><li><a href=\"https:\/\/internethealthreport.org\/2018\/the-good-the-bad-and-the-ugly-sides-of-data-tracking\/\"><b>The Good, the Bad, and the Ugly Sides of Data Tracking:<\/b><\/a> Mozilla has this and several other great articles about online privacy and security. \u00a0\u00a0\u00a0<\/li><li><a href=\"https:\/\/www.youtube.com\/watch?v=JAO_3EvD3DY\"><b>(Video) How Facebook Tracks Your Data:<\/b><\/a> The New York Times put together this video about how Facebook tracks and uses data to gather insights about people. Facebook isn\u2019t the only one who tracks people; they are just used as an example because they are a larger tech company.<\/li><li><a href=\"https:\/\/www.wired.com\/story\/wired-guide-personal-data-collection\/\"><b>The Wired Guide to Your Personal Data (and Who is Using it):<\/b><\/a> Wired allows four free articles per user, per month. This is a great resource, but there are others out there as well.\u00a0\u00a0\u00a0\u00a0 <\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1107\" aria-expanded=\"false\">Which Websites are Safe?<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1107\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1107\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-identify-and-protect-yourself-from-an-unsafe-website\/\"><b>How to Identify &amp; Protect Yourself from an Unsafe Website<\/b><\/a><b> (Boston University)<\/b><\/li><li><a href=\"https:\/\/www.northeastern.edu\/securenu\/how-can-i-tell-if-a-website-is-secure\/\"><b>How Can I Tell if a Website is Secure?<\/b><\/a><b> (Northeastern University)<\/b><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1108\" aria-expanded=\"false\">Using a Password Manager<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1108\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1108\" tabindex=\"0\" hidden=\"hidden\"><ul><li><a href=\"https:\/\/www.youtube.com\/watch?v=Q0GeMSFGIgI\"><b>(Video) How To Use a Password Manager:<\/b><\/a> This video from The Verge describes how to set up and use a password manager. It uses LastPass as an example, and provides information about security threats.\u00a0\u00a0\u00a0<\/li><li><a href=\"https:\/\/www.pcmag.com\/roundup\/331555\/the-best-free-password-managers\"><b>The Best Free Password Managers for 2019:<\/b><\/a> PC Magazine reviewed the top password managers to secure passwords in one location.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Stay Safe &amp; Secure Online Click on a topic to the left to find tutorials and resources to stay safe and secure online. How to Stay Safe Online What is Online Identity Theft? Password &#038; Account Safety What is a Data Breach? What is Phishing? Where Does My Data Go &#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/libraries.ne.gov\/siouxcounty\/stay-safe-amp-secure-online\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":261,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-134","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/pages\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/users\/261"}],"replies":[{"embeddable":true,"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/comments?post=134"}],"version-history":[{"count":4,"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/pages\/134\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/pages\/134\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/libraries.ne.gov\/siouxcounty\/wp-json\/wp\/v2\/media?parent=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}