Cyber Attacks
Cyber attacks are deliberate attempts to disrupt, damage, or gain unauthorized access to computer systems, infrastructure, or digital networks. These attacks can target individuals, businesses, utilities, hospitals, banks, or entire governments, and they often happen without immediate visible signs.
Cyber attacks may lead to:
- Widespread power outages
- Emergency service disruptions
- Transportation failures
- Financial theft or identity fraud
- Disinformation campaigns during crises
- Data loss, ransom demands, or exposure of sensitive information
Types of Cyber Threats
- Data Breaches – Stealing personal, medical, or financial data
- DDoS Attacks – Flood systems to crash websites/networks
- Infrastructure Hacking – Targeting power, water, or traffic systems
- Phishing – Fraudulent emails to steal information
- Ransomware – Locks your system until money is paid
Preparedness Tips
For individuals
- Use strong, unique passwords and change them regularly
- Enable multi-factor authentication (MFA) on all accounts
- Keep operating systems, antivirus, and firewalls up to date
- Back up important files on an external hard drive or secure cloud storage
- Avoid clicking unknown links or downloading unverified attachments
For households and small businesses
- Secure your Wi-Fi network with encryption and complex passwords
- Disable unused services and ports on routers
- Invest in professional cybersecurity services for sensitive systems
- Use UPS systems or battery backups for essential electronics
During a Cyber Attack
Signs of an ongoing attack:
- Unusual pop-ups, forced logouts, or unauthorized access
- Sudden loss of network, electricity, or public utility function
- Banking or identity alerts you did not initiate
- Incorrect GPS directions or communication disruptions
Immediate Actions
- Disconnect affected devices from the internet
- Do not pay ransoms or provide sensitive information
- Notify your service provider or IT professional
- Monitor for fraud on all accounts
- Report to local law enforcement and federal agencies (see below)
Critical Infrastructure Threats
- Cyber attacks on water treatment, hospitals, banks, or the electric grid may result in cascading crises
- Treat these like multi-system disasters and prepare alternative water, power, and communication plans
Recovery
- Scan and clean devices before reconnecting to networks
- Reset all passwords—use a password manager
- Monitor credit and financial reports for long-term fraud
- Cooperate with official investigations if affected in a large breach
Key Resources
- Cybersecurity and Infrastructure Security Agency (CISA)
cisa.gov - Federal Trade Commission (FTC) – Identity Theft Recovery
identitytheft.gov - Internet Crime Complaint Center (IC3) – File federal complaints
ic3.gov
Recommended Apps & Tools
- 1Password / Bitwarden – Secure password management
1password.com / bitwarden.com - HaveIBeenPwned – Check if your email has been breached
haveibeenpwned.com
- Signal – Encrypted communication tool
signal.org
