Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Cybersecurity Emotions
Share:
Several photos in a college of a woman

Cybersecurity Emotions

At CISA, our commitment to cybersecurity isn't just about technology; it's about the human experience.

In our increasingly digital world, it's essential to protect data and defend ourselves against malicious cyber actors. To prevent being hacked or falling for a phishing scheme, everyone, from individuals to industry, must take actions to Secure Our World.

Every day, online predators are looking for their next target – don’t let it be you!

Think you’re not a target? That’s what cyber criminals are counting on.  Your identity, your financial data, and the contents of your email are valuable to a malicious hacker. To reduce the chances of falling for cyber scams, learn the basics of “cyber hygiene” - easy and common-sense ways to protect yourself online.

Software Update Available? Do it now!

Update your software. In fact, turn on automatic software updates if they're available.

Bad actors will exploit flaws in the system. Network defenders are working hard to fix them as soon as they can, but their work relies on all of us updating our software with their latest fixes.  Update the operating system on your mobile phones, tablets, and laptops. And update your applications – especially the web browsers – on all your devices too.   Leverage automatic updates for all devices, applications, and operating systems.  

Use Strong Passwords

Watch the Use strong passwords video

 

Did you know the most common password is “password”? Followed by “123456”? Using your child’s name with their birthday isn’t much better.   

Picking a password that is easy is like locking your door but hanging the key on the doorknob. Anyone can get in.   

Here are some tips for creating a stronger password. Make sure it’s: 

  • long – at least 16 characters,  
  • unique – never used anywhere else, 
  • and randomly generated – usually by a computer or password manager. They’re better than humans at being random. 

Make sure you’re not recycling the same password across all your apps and websites. You can use a password manager to store all of your passwords. That way you don’t have to remember them all! If you go this route, make sure your master password is strong and memorable, and secure your password manager account with MFA! 

Read more
Think Before You Click

Watch the Think Before You Click video

 

Have you ever seen a link that looks a little off? It looks like something you’ve seen before, but it says you need to change or enter a password. Or maybe it asks you to verify personal information. It could be a text message or even a phone call. They may pretend to be your email service, your boss, your bank, a friend….The message may claim it needs your information because you’ve been a victim of cybercrime.    

It’s likely a phishing scheme:  a link or webpage that looks like a legitimate, but it’s a trick designed by bad actors to have you reveal your passwords, social security number, credit card numbers, or other sensitive information. Once they have that information, they can use it on legitimate sites. And they may try to get you to run malicious software, also known as malware. Sadly, we are more likely to fall for phishing than we think.    

If it’s a link you don’t recognize, trust your instincts and think before you click. We all need to Fight the Phish!   

Read more
Multifactor Authentication

Watch the Enable MFA video.

 

These characters come together to create a vibrant narrative that makes the exploration of cybersecurity practices not only informative but also entertaining.

Let's start with turning on Multifactor Authentication! It goes by many other names including:

  • Two Step Authentication
  • 2-Step Verification
  • Two Factor Authentication
  • 2FA

But they all mean the same thing: opting into an extra step. Step one is your password. Step two is when trusted websites and applications ask you to confirm you’re really who you say you are.

Your bank, your social media network, your school, your workplace, etc... they want to make sure you’re the one accessing your information. So, industry is taking a step to double check your identity, instead of simply asking you for a password, which can be reused, more easily cracked, or stolen.

They can verify it’s you by asking for two forms of information:

  • Something You Know, like a PIN number or a challenge question and answer.
  • Something You Have, like an authentication application or a confirmation text on your phone.
  • Something You Are, like a fingerprint or face ID.

That second step is a lot harder for a hacker to fake. So, prove it’s you with two… two steps, that is.

Now that you know what it is, you’ll see prompts for multifactor authentication all over. So opt-in!

Start with your email account, then financial services, then social media accounts, then online stores, and don’t forget your gaming and streaming entertainment services.

Our world is increasingly interconnected, so while we must protect ourselves, it’s going to take all of us to really protect the systems we rely on.

Check back often as we add videos showing Eda navigating a path to being cybersecure!

Read more

Don't Fear Cyber Safety!

To make cybersecurity engaging and relatable, we present the characters behind the Cybersecurity Emotions series. These lively characters bring a dynamic element to our exploration of essential online safety practices.

Meet the characters:

A photo of a woman looking at her phone

Eda, the Every Day American as the Main Character

Eda represents the average American tech user, navigating the digital landscape without a full grasp of cybersecurity tools and tips. Watch Eda's journey and discover simple ways to keep your online presence secure.

A happy woman holding a complex password

Happy

Overly excited about the digital world, Happy often dives into risky cyber behavior. Happy plays a pivotal role in encouraging other emotions to adopt good cyber hygiene practices.

A fearful woman running away from a threat

Fear

Aware of the scary aspects of the digital realm, Fear recognizes the lurking threats and helps highlight strategies that could enhance online safety.

Unmotivated person

Unmotivated

Sadly, lacking the energy for online protection, Unmotivated enjoys dissuading others from cybersecurity measures. This laid-back attitude contrasts with the urgency of online security.

Logical person

Logic

With a solid grasp of cybersecurity hygiene, Logic knows the essential steps for online safety. However, the challenge lies in convincing other emotions to follow suit.

Irritated woman

Irritation

Too cool for "cyber school," Irritation isn't interested in what others have to say. Irritation cuts to the heart of the issue and encourages the actions to stay safe online.

Related Resources

Secure Our World

Secure Our World

Publication

Multi-Factor Authentication (MFA) 

Follow the series

Follow the series
facebook twitter youtube instagram linkedin

Report a Cyber Issue

Organizations can also report anomalous cyber activity and/or cyber incidents 24/7 to report@cisa.gov or by calling 1-844-Say-CISA (1-844-729-2472).

Sign up for Cyber Hygiene Services

sign up

View All CISA Services

view services

Secure Our World

Simple ways to protect yourself, your family and your business from online threats.

Learn more

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback