CISA Blog

Safeguarding Your Data

Protect both your personal and work-related data.

Securing Network Infrastructure Devices

Learn about the threats and risks associated with network infrastructure devices and how you can protect your network from cyber-attacks.

Evaluating Your Web Browser's Security Settings

The security settings within your browser are an important safeguard.

Recovering from Viruses, Worms, and Trojan Horses

If your computer gets infected with malicious code, there are steps you can take to recover.

2009 National Infrastructure Protection Plan Released

Risk management and stakeholder engagement are key elements of TSA's surface transportation initiatives. Unlike in aviation, where TSA has employees performing security functions, we utilize stakeholder partnerships, grant funding and rulemaking to enhance security in surface modes.

Choosing and Protecting Passwords

Passwords are a common form of authentication and are often the only barrier between you and your personal information. There are several programs attackers can use to help guess or crack passwords.

Good Security Habits

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.

Understanding Anti-Virus Software

Keep anti-virus software up to date to help protect your systems and information.

Protecting Against Malicious Code

What is malicious code? Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

Protecting Your Privacy

Before submitting your name, email address, or other personal information on a website, look for the site's privacy policy. This policy should explain how the information will be used and whether or not the information will be distributed to other organizations.

Powered by RSS 2 HTML