Tips describe and offer advice about common security issues for non-technical computer users. Sign up to receive these security tips in your inbox or subscribe to our RSS feed. Threats Protecting Against Ransomware Protecting Against Malicious Code Securing Voter Registration Data Handling Destructive Malware Dealing with Cyberbullies Understanding Denial-of-Service Attacks Avoiding Social Engineering and Phishing Attacks Preventing and Responding to Identity Theft Email and Communication Staying Safe on Social Networking Sites Understanding Digital Signatures Using Caution with Email Attachments Reducing Spam General Information What is Cybersecurity? Guidelines for Publishing Information Online General Security Information Proper Disposal of Electronic Devices Defending Against Illicit Cryptocurrency Mining Activity Securing Network Infrastructure Devices Securing the Internet of Things Home Network Security Preparing for Tax Season Keeping Children Safe Online Understanding Firewalls for Home and Small Office Use Good Security Habits Mobile Devices Privacy and Mobile Device Apps Holiday Traveling with Personal Internet-Enabled Devices Cybersecurity for Electronic Devices Using Caution with USB Drives Securing Wireless Networks Privacy Supplementing Passwords Protecting Your Privacy Choosing and Protecting Passwords Safe Browsing Shopping Safely Online Understanding Bluetooth Technology Understanding Website Certificates Software and Applications Understanding Patches and Software Updates Network Defense and Enterprise Security Best Practices for Securing Election Systems Questions Every CEO Should Ask About Cyber Risks Website Security Securing Enterprise Wireless Networks Archive Before You Connect a New Computer to the Internet International Mobile Safety Tips Protecting Portable Devices: Physical Security Understanding Hidden Threats: Rootkits and Botnets Understanding ISPs Avoiding the Pitfalls of Online Trading Identifying Hoaxes and Urban Legends Understanding Hidden Threats: Corrupted Software Files Debunking Some Common Myths Understanding Voice over Internet Protocol (VoIP) Recognizing Fake Antiviruses Real-World Warnings Keep You Safe Online Effectively Erasing Files How Anonymous Are You? Risks of File-Sharing Technology Reviewing End-User License Agreements Avoiding Copyright Infringement Understanding Your Computer: Email Clients Understanding Your Computer: Web Browsers Understanding Your Computer: Operating Systems Protecting Portable Devices: Data Security Understanding Encryption Recognizing and Avoiding Spyware Using Instant Messaging and Chat Rooms Safely Benefits of BCC Understanding Anti-Virus Software Understanding Internationalized Domain Names Benefits and Risks of Free Email Services Recovering from Viruses, Worms, and Trojan Horses Evaluating Your Web Browser's Security Settings Browsing Safely: Understanding Active Content and Cookies Safeguarding Your Data Defending Cell Phones and PDAs Against Attack (Source Site: https://www.cisa.gov/uscert/ncas/tips)