Cyber Presence/Safety

“Cyber presence,” for the purpose of this learning resource, refers to your participation on the internet, and “cyber safety” refers to your ability to maximize your personal safety and minimize your security risks, such as risks to your private information, while utilizing the internet.


There are numerous threats to cyber safety, which include, but are not limited to:

  • Malware and bots.
    • Used to remotely take over people’s computers.
    • May allow hackers to view passwords you enter.
    • May allow hackers to track your moves.
  • Spam emails.
    • May contain disguised links that prompt you to complete a download, which is actually a download for a computer virus.
    • May be used fraudulently, such as a hacked account of a relative soliciting the victim’s family for money.
    • Hackers create email accounts that look like they are from a real company and use them to collect personal information, which can then be used to commit crimes such as opening credit card accounts under the victim’s identity.
  • Unsecured home networks.
    • Hackers may be able to access the Internet through your network and possibly gain access to your computer if proper preventative actions aren’t taken.
  • Lost items.
    • Losing items such as laptops and cell phones may allow hackers to easily access data on the devices if it’s not properly encrypted.
    • Using the internet to stalk or harass.
    • Using the internet to purposefully abuse or intimidate.
  • Online predators.
    • Use the internet to engage in inappropriate and generally unlawful sexual relationships.


There are numerous ways to help protect your cyber safety, which include, but are not limited to:

  • Be aware of the scams.
    • Do research to educated yourself on popular scams so you know what to look for and what to avoid.
  • Be confident in your clicks.
    • Only click on links of messages from people you know and trust.
    • Know that the links may still be phishing/virus links, even if from a trusted individual.
  • Be safe in your perusing.
    • Make sure you’re on the correct website.
    • A scam/phishing site may look very similar and have a very similar web address.
  • Be safe when shopping.
    • Make sure you pay through a secure site.
  • Be creative with your passwords.
    • Use a random combination of letters, numbers, and symbols, as allowed.
  • Be protective.
    • Back up your data.
    • Check financial statements for fraudulent activity.
  • Be careful of your Wi-Fi.
    • Make sure your network is password protected.
  • Be current.
    • Stay up to date with protective software updates.



Do your own research! No Longer Silenced Movement encourages you to do your own research about topics of your interest in order to formulate your own educated opinion.