top of page
![](https://static.wixstatic.com/media/41d000_9bace29101c0110bf92b86118c5802c4.png/v1/fill/w_96,h_54,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/41d000_9bace29101c0110bf92b86118c5802c4.png)
Microbytes n' bits
What is Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
![tips-for-kids-06-fb.png](https://static.wixstatic.com/media/459124_e2f6330b4442427881e66adc6f8099ac~mv2.png/v1/fill/w_238,h_226,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/tips-for-kids-06-fb.png)
Types of Cybersecurity Threats
MALWARE
Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
RANSOMWHERE
Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.
Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.
SOCIAL ENGINEERING
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. It can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. It can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
PHISHING
Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.
The ABC's of Cybersafety
Ask An Adult
Always check with a parent or guardian before making accounts and using private information.
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
Back It Up
Keep multiple copies of important data (especially if you are using your parents' devices).
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
Catch the Crimeware
Malicious software can be anywhere. Always be alert.
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
Don't Click
If you are unsure if something is a phish, better to be safe than sorry and don't click.
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_ff73ca63250240b2a3c975834afa9356~mv2.png)
![](https://static.wixstatic.com/media/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png/v1/fill/w_40,h_11,al_c,lg_1,q_85,blur_3,enc_auto/5bfb6f_c2ae26a3c5004bca9ea2b860a535f4ab~mv2.png)
bottom of page