Cyber Attacks

Cyber attacks are deliberate attempts to disrupt, damage, or gain unauthorized access to computer systems, infrastructure, or digital networks. These attacks can target individuals, businesses, utilities, hospitals, banks, or entire governments, and they often happen without immediate visible signs.

Cyber attacks may lead to:

  • Widespread power outages
  • Emergency service disruptions
  • Transportation failures
  • Financial theft or identity fraud
  • Disinformation campaigns during crises
  • Data loss, ransom demands, or exposure of sensitive information

Types of Cyber Threats

  • Data Breaches – Stealing personal, medical, or financial data
  • DDoS Attacks – Flood systems to crash websites/networks
  • Infrastructure Hacking – Targeting power, water, or traffic systems
  • Phishing – Fraudulent emails to steal information
  • Ransomware – Locks your system until money is paid

Preparedness Tips

For individuals

  • Use strong, unique passwords and change them regularly
  • Enable multi-factor authentication (MFA) on all accounts
  • Keep operating systems, antivirus, and firewalls up to date
  • Back up important files on an external hard drive or secure cloud storage
  • Avoid clicking unknown links or downloading unverified attachments

For households and small businesses

  • Secure your Wi-Fi network with encryption and complex passwords
  • Disable unused services and ports on routers
  • Invest in professional cybersecurity services for sensitive systems
  • Use UPS systems or battery backups for essential electronics

During a Cyber Attack

Signs of an ongoing attack:

  • Unusual pop-ups, forced logouts, or unauthorized access
  • Sudden loss of network, electricity, or public utility function
  • Banking or identity alerts you did not initiate
  • Incorrect GPS directions or communication disruptions

Immediate Actions

  • Disconnect affected devices from the internet
  • Do not pay ransoms or provide sensitive information
  • Notify your service provider or IT professional
  • Monitor for fraud on all accounts
  • Report to local law enforcement and federal agencies (see below)

Critical Infrastructure Threats

  • Cyber attacks on water treatment, hospitals, banks, or the electric grid may result in cascading crises
  • Treat these like multi-system disasters and prepare alternative water, power, and communication plans

Recovery

  • Scan and clean devices before reconnecting to networks
  • Reset all passwords—use a password manager
  • Monitor credit and financial reports for long-term fraud
  • Cooperate with official investigations if affected in a large breach

Key Resources

  • Cybersecurity and Infrastructure Security Agency (CISA)
    cisa.gov
  • Federal Trade Commission (FTC) – Identity Theft Recovery
    identitytheft.gov
  • Internet Crime Complaint Center (IC3) – File federal complaints
    ic3.gov

Recommended Apps & Tools