When your computer is accessible through an internet connection or Wi-Fi network, it is susceptible to attack. However, you can restrict outside access to your computer with a firewall.| Cybersecurity and Infrastructure Security Agency CISA
Spam is the electronic version of “junk mail.†The term spam refers to unsolicited, often unwanted, email messages. Spam does not necessarily contain viruses—valid messages from legitimate sources could fall into this category.| Cybersecurity and Infrastructure Security Agency CISA
Before submitting your name, email address, or other personal information on a website, look for the site's privacy policy. This policy should explain how the information will be used and whether or not the information will be distributed to other organizations.| Cybersecurity and Infrastructure Security Agency CISA
What is malicious code? Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.| Cybersecurity and Infrastructure Security Agency CISA
Identity theft, or identity fraud, is a crime that can have substantial financial and emotional consequences. Take precautions with personal information. If you become a victim, act immediately to minimize the damage.| Cybersecurity and Infrastructure Security Agency CISA