Skip to content

More Options

Do your part for National Cyber Security Awareness Month

Ncasm ChampThe Internet has become an integral part of our daily lives - we work, learn, and play online. But as we enjoy living rich digital lives, we’ve also become exposed to sophisticated cyber attacks. They can spread quickly from personal computers to corporate and government networks, wreaking havoc on our nation’s infrastructure and economy. Cyber safety has become a top national security priority, and we are all responsible for maintaining it.

That’s why the U.S. Department of Homeland Security and the National Cyber Security Alliance designated October as the annual National Cyber Security Awareness Month. As an official Cyber Security Awareness Month 2014 Champion, Trend Micro will share new resources on cyber security each week.


National Cyber Security Month

What you’ll learn each week

Week 1

Week 1 (October 1-3): General online safety: STOP. THINK. CONNECT.

STOP. THINK. CONNECT. Learn how following these simple, but powerful, steps will help you protect yourself and others online.

Week 2

Week 2 (October 6-10): Secure development

The week’s focus is on the importance of building security into the information technology products we use every day - phones, tablets computers, and other staples of modern living.

Week 3

Week 3 (October 13-17): Critical infrastructure and the Internet of Things

The Internet of Things (IoT)—the concept of everyday objects connecting to the Internet and transmitting data—is changing the way we think about and use technology. Join us to learn what the IoT means for cyber security and how you can protect your connected devices.

Week 4

Week 4 (October 20-24): Small-medium businesses/entrepreneurs

What can small and medium-sized businesses do to protect their critical data, customers, and reputations? Find out from our threat experts during week #4.

Week 5

Week 5 (October 27-31): Cybercrime and law enforcement

Cybercrime cuts across international boundaries, making it exceedingly difficult to detect and prosecute. This week, you’ll get insight on the importance of collaborating with law enforcement to thwart cyber criminal activity internationally.

Week 1

Week 1 (October 1-3): STOP. THINK. CONNECT.

The Internet is a shared resource, and securing it is Our Shared Responsibility, the theme of National Cyber Security Month this year. Learn how you can help make the Internet a safer place with a few simple steps. Check in often for daily additions to the expert blog posts, videos, and webinars available.

Blog Post: Introduction to National Cyber Security Awareness Month
Christopher Budd, a global threat communications manager with Trend Micro, talks about the significance of the initiative. Get his perspective.

Blog Post: Being safe online is everyone's responsibility
Get an expert's view on the role we each play in securing the Internet.

Video: How to spot a phishing scam Do you know how to spot a phishing scam? Clicking on a bad link in an email or on a social media site can lead to malware, data loss, and identity theft. Learn the signs of this common bad-guy tactic.

Video: Your actions matter: Keeping your company safe
Without proper safety measures in place, any one employee has the power to cause data leaks and other cyber-security problems for your company. Rik Ferguson, Trend Micro’s Vice President of Security Research, explains in greater detail how individual actions can affect your whole enterprise. Learn what you can do.

Blog Post: Information security: It’s a journey

Unfortunately, even well-intentioned employees pose security risks to enterprises, large and small. What can employers do to provide effective cyber safety training? Learn from Rick’s blog.

Video: Mobile banking and its risks
Traditional online banking was once relatively safe, but the switch to mobile has confounded security experts. In this video, Trend Micro CTO Raimund Genes explains how the so-called man-in-the-middle attacks can infect phones and desktops alike with malware. Watch the video.



Video: Cybercrime exposed: When adware goes bad
Nothing in life is free—including the free wallpapers, music, and widgets you can't resist downloading. The permissions you give adware by clicking on a link or icon within these "free" products can endanger both your computer and your personal information. Don't fall for a trap.

Week 2

Week 2 (October 6-10): Secure development

The software on products you use every day—phones, tablets and computers—can compromise your privacy. How can product developers prevent security vulnerabilities when building products or apps? And what do users need to know to protect themselves? The following resources will help answer those questions. Check for daily updates.

Data Gathering

Video: Data gathering is a two-way street
The proliferation of “smart” products—phones, TVs, gaming consoles—is a marketer’s dream. But these devices also make it harder for consumers to retain control of their information. What do vendors do with the information they collect, and how should they communicate their intentions to customers? Watch Trend Micro CTO Raimund Genes tackle this sensitive issue.


Report: Web application vulnerabilities: How safe is your business?
Businesses love how easy web applications make it to interact with customers, but a number of factors involving their development and upkeep pose security risks. Read our report on these vulnerabilities and how to address them. Get our free Web app safety report.

Blog: Chicken or the egg? Secure app development
So far in 2014, we have seen nearly 600 breaches logged in the U.S. alone. Much of the attention goes to the attackers, but apps are the gateway. Learn more about secure app development.

Blog: Mobile App Developers: Compete on privacy and security, too
Mobile-app creators devote considerable time perfecting the features that make for a must-download product, but how much thought do they give to the privacy and security of their users? Trend Micro CTO Raimund Genes outlines how developers can keep their customers safe. Read his tips.

Week 3

Week 3 (October 13-17): Critical infrastructure and the Internet of Things

The Internet of Things (IoT) or the Internet of Everything (IoE) is a concept that connects objects, people, processes, and networks through the Internet. The IoT ecosystem is designed to improve our lives, but it also brings security threats. Get expert blogs, articles, and videos on the IoT and securing it. Check for daily updates.

Blog Post: Smart meters and grids are the next cybercrime victims

The “smartification” of the electric meter means shorter outage periods and tighter consumer control of energy consumption, but as with most conveniences, it carries risks, including exposure to cybercrime. See what could go wrong with smart meters.

Internet Of EverythingVideo: Securing the Internet of Everything
Cars, watches, phones, health devices—the more devices we connect to the cloud, the more we risk our data falling into the wrong hands. What can companies do to keep their customers’ information safe? Watch what Trend Micro CTO Raimund Genes has to say about the IOE.

Blog Post: What to consider when buying a smart device

Attacks on smart devices such as light switches and baby monitors are becoming more common, but consumers can minimize their risks. This in-depth analysis explains what factors to weigh when purchasing and installing smart devices for your home. Find out the smart way to buy smart devices.

Infographic: Are you ready for wearable devices?
Smart devices like health monitors and fitness trackers gather sensitive data, making them prime targets for cyber criminals. Our infographic gives an overview of the three different types of wearable devices in terms of how they send and receive data. Wearable devices at a glance.

Week 4

Week 4 (October 20-24): Small-medium businesses/entrepreneurs

Cyber breaches can damage a company’s brand and profits, sometimes irreversibly. During week #4, organizations will learn how to prevent cyber attacks and safeguard their data and reputations.Get expert insight in the following blogs, reports, and videos. Check for daily updates.

Protect CoredataVideo: Advice for enterprises: Protect your core data

If even the NSA can’t keep its data locked down, how can companies stand a chance at doing the same? Trend Micro CTO Raimund Genes offers expert advice to enterprises on identifying and protecting the information that’s most crucial to their bottom line and their customers’ safety. Watch the video.


8 Backdoor techniques attackers use to steal your data
Backdoors allow hackers to quietly sneak into unprotected computers, spy on digital conversations, and steal information. Trend Micro researchers examined the ways in which attackers use backdoors to command and control their target networks. Learn what vulnerabilities to look for.

Targeted attacks hub: Expert insight and advice
This is your place for comprehensive information on targeted attacks: What they are, how they’re evolving, and what you can do to defend yourself. Get informed about targeted attacks.

Enterprise fights back
Read our four-part series on how businesses are protecting themselves against cyber crime.

Blog post: Keep your business data safe in the cloud

Can you entrust your data to the cloud? Rik Ferguson, Trend Micro’s Vice President of Security Research, offers expert insight. Learn more about cloud security.

Video: Securing your online reputation
You can have the slickest-looking site in the world, but if it's not secure, it could mean the difference between success and failure for your business. Security should never be an afterthought. Find out why smart planning is essential.

Week 5 (October 27-31): Cybercrime and law enforcement

How can businesses and local communities work with law enforcement to prevent international cybercrime? Get expert insight on international cybercrime and the importance of cross-boundary cooperation in stopping it. Stay tuned for daily updates.

Rebuilding TrustRebuilding trust: Is your data safe?
In this CTO Insights video, Trend Micro CTO Raimund Genes explores the importance of trust and transparency in the Internet age, and the role corporations play in keeping the Internet safe.
Watch the video.


Inside the cybercriminal underground
In this in-depth series, we dive deep into the booming cybercriminal underground markets in China and Russia.
Learn how the bad guys think

Free webinar: FBI insights on fighting cybercrime
Join Jon Clay, Senior Manager of Global Threat Communications at Trend Micro, as he moderates a live discussion of the topic with an FBI agent.  Register today.


Connect with us on