U.S. Army Cyber Command - ARMY CYBER

You Are the First Line of Defense

Cyberspace operations are critical to our Nation and the Army’s mission. Securing cyberspace is a 24/7 responsibility. By dedicating ourselves to increased online security we help stay Army Strong.


National Cyber Security Awareness Month

During October, the U.S. Army observes National Cybersecurity Awareness Month – it is a dedicated period of time to focus on the Army’s communications and practices to ensure our networks remain safe and secure. 

Stop and Get the Facts

The Facts: Cookies

A cookie is information a website saves to your computer using your web browser. A cookie allows sites to record your browsing activities –what pages and content you've looked at, when you visited each site, what you searched for, and whether you clicked on an advertisement. Data collected by cookies can be combined to create a profile of your online activities.

The Facts: Cybersecurity 101

The cyber threat facing the Army is pervasive and increasingly sophisticated. Cyber attacks constantly threaten Army network, information and personnel. Working together, we all play an essential role in keeping our networks, information and personnel safe from harm.

The Facts: Cybersecurity For Army Family Members

A family's posts to keep friends up to date on their vacation led to their home being burglarized while they were away.

The Facts: Cybersecurity Resources

A collection of resources to help you protect yourself online.

Free antivirus software is available online for DoD employees to download and use at home (authentication required)

The Facts: Cybersecurity Tips

Basic cybersecurity doesn't take a great deal of effort. Here are 10 simple tips that will go a long way to protecting you online.

The Facts: Cybersecurity Tips For International Travelers

Treat your information and communications and the devices that contain and transmit as valuables. The more you protect yourself, the more secure your information and devices will be.

The Facts: Safely Disposing Of Old Computers

Computers often hold personal and financial information, including:

  • passwords
  • account numbers
  • license keys or registration numbers for software programs
  • addresses and phone numbers
  • medical and prescription information
  • tax returns
  • files created automatically by browsers and operating systems

The Facts: Geo-Tagging

Geo-tagging is adding geographic identification to photographs, videos, websites and SMS messages. It's like tagging a precise map grid coordinate to everything you post on the internet.

The Facts: Insider Threats

Organizations can often mitigate the threat of outsiders stealing their property, either physically or electronically. But the insider -- the employee with legitimate access – can be much harder to detect and stop. Whether stealing for personal gain or conducting espionage, someone who steals information or products to benefit another organization or country can do serious damage. Foreign governments intent on illegally acquiring information may try to recruit existing employees to do the job for them.

The Facts: Malware And Botnets

Viruses are harmful computer programs that can be transmitted in a number of ways and differ in many ways, but are all designed to spread themselves from one computer to another through the Internet. Most commonly, they are designed to give the criminals access to the infected computers.

The Facts: Online Shopping

Online shopping is convenient, easy, and quick. But it's wise to make sure you're protected before you start adding items to your cart.

The Facts: Passwords & Securing Your Accounts

Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords.

The Facts: Phishing And Spearphishing

What is "phishing?"
Email attack is the preferred method for many hackers. Verizon's 2013 Data Breach Investigations Report found that "more than 95% of all attacks tied to state-affiliated espionage employed phishing as a means of establishing a foothold in their intended victims' systems."

The Facts: Protecting Home Networks

What are some ways I can protect my home network from malware, viruses and hackers?

The Facts: Protecting Personally Identifiable Information

What are some ways I can protect my personally identifiable information (PII) online?

The Facts: Social Networking Basics

Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of online lives. They're a great way to stay connected with others, but you should be cautious about how much personal information you post.

Additional Resources for National Cybersecurity Awareness Month:

Cyber Awareness Links

Here are some resources to educate and help you before connecting or if you’ve become a victim of a cyber crime.



U.S. Army Computer Emergency Response Team - Download Antivirus Software

DoD Employees may download antivirus software from home.
(Authentication Required)



Homeland Security

Department of Homeland Security – National Cyber Security Awareness Month


Army CID Tip

Army Criminal Investigation Command – “CID cyber tips: Protecting your online identity”



Internet Crime Complaint Center (IC3), which is and FBI-NW3C Partnership



Federal Trade Commission (Identity Theft)


External Link Disclaimer