Official websites use .mil
Secure .mil websites use HTTPS
Our fact sheets offer a wide range of information and tips designed to help keep you and your family safe from cyber threats and criminals, secure from real-world physical threats, and knowledgeable about the Army and DoD cyber forces.
Information and tips on how to protect your important data
A collection of websites, videos and other resources to help you protect yourself online.
A glossary of basic cybersecurity terminology to help you distinguish spam from cookies and worms from viruses.
Tips and information on how to protect your data and devices while traveling.
The DoD Antivirus Software License Agreement with McAfee allows active DoD employees to utilize the antivirus software for home use.
Many public Wi-Fi hotspots don't encrypt the information you send over the internet, and are not secure.
Mobile devices such as laptops, tablets and smartphones come with their own threats and vulnerabilities. Here are some ways to help keep your devices safe.
This best practices guide from the National Security Agency outlines steps users can take to better protect personal devices and information.
Online shopping is convenient, easy, and quick, but it's best to make sure you’re protected before you start adding items to your cart.
Passwords and account authentication protect you and prevent unauthorized access and activity. Here are some ways to help ensure they're as secure as can be.
Email attack is the preferred method for many hackers who are trying to steal your information. Here are some ways to spot and prevent those attacks.
Here are some simple things you can do to help protect your home network from malware, viruses and hackers.
Tips and resources for keeping your personal information safe online.
Smishing -- phishing via Short Message Service (SMS) -- is becoming an increasingly popular way for cyber crooks to steal personal and financial data to commit fraud, theft.
Some cybersecurity basics -- baiting, cookies, juice jacking, QR codes, safe disposal of old computers, and shoulder surfing -- and ways to protect yourself.
Zero Trust assumes that no implicit trust is granted to assets or users based solely on their physical or network location or asset ownership, and continuously authenticates, authorizes, and validates access to systems, applications, and data.
Ways to help keep your social networking experience safe
A guide with basic cybersecurity best practices, as well as instructions and guidelines for ensuring a more secure experience on popular social media sites.
Some hazards Army Family members should watch out for online and ways to minimize threats.
A few basic strategies can go a long way to help keep you safe on social media networks.
Some suggestions for talking with your kids about online safety and good digital citizenship.
Basic information on the Army and Department of Defense cyber mission
Current trifold publication with general information about U.S. Army Cyber Command, its people, mission and locations.
Information about the purpose and mission of the Cyber Mission Force (CMF) and Cyber National Mission Force (CNMF).
Fortitude Hall brings key ARCYBER elements together under the same roof for the first time since the organization’s founding in 2010.
Hack The Army is a “bug bounty” program that builds on the efforts of Army and Department of Defense security professionals in safeguarding DoD and Army networks, systems and data.
The U.S. Army Cyber Protection Brigade (CPB) -- the “Hunter” brigade -- hunts advanced adversaries to enable information advantage in multi-domain operations.
Some ways to spot and avoid danger
Information and tips to help identify terrorist activity and tactics and keep you safe.
Some ways to detect and help to mitigate the threat of insiders -- those with legitimate access -- from stealing property or information.
Members of the Army team need to be constantly vigilant for attempts to approach them to obtain classified, sensitive or controlled information and to gain military, political, economic, industrial or other advantages.
Best practices for working remotely
This joint CISA-NSA telework guide reviews some best practices for teleworking.
As more Army employees are teleworking away from traditional government places of duty, good all-around network security and telework practices become even more vital.
Ways to identify, avoid and deal with online criminals
Mail servers and computer workstations running mail clients are frequently targeted by malicious attackers and cyber criminals.
Thousands of fraudulent or fake websites are built every day to try to lure visitors into giving away personal and financial information, buy products that don’t exist, or download malware that disrupts devices and data.
LinkedIn is a great resource for job searches and building professional connections. Because the platform tends to be more trusted by users, it is commonly used by criminals and hackers for profit, to spread malware, or to steal personal or sensitive data.
A bit about ransomware, viruses, adware, spyware and botnets with tips to protect yourself.
Online impostors claim to be someone they are not for recognition or financial gain. Here are some tips for spotting, avoiding and reporting fake accounts.