Recent data breaches and widespread breakouts of malicious software have gained the attention of the nation. According to recent studies, 96 percent of Americans feel a personal responsibility to be safer and more secure online and 90 percent said they want to learn more about safe internet usage.

The message is clear: cyber threats affect everyone, and everyone has to take action to protect themselves and their families.

Consumers are advised to “Stop. Think. Connect.” when using computers and web-enabled devices:


  • others from accessing your accounts by setting secure passwords.
  • sharing too much personal information.


  • before you click. Is this a trusted source?
  • about what you post or share. What’s online, stays online…maybe indefinitely.


  • over secure networks. Wi-Fi hotspots may not offer the same protection.
  • wisely. Trust your gut. If it doesn’t seem right, then close out or delete the email.

For more cyber safety information, visit the DATCP website at, call the Consumer Protection Hotline at 800-422-7128 or send an e-mail to

Below are some cyber safety tips from DATCP.

What is “cyber security?” What is at risk?

According to Merriam-Webster, “cybersecurity” is defined as “measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.”

In other words, cybersecurity means taking steps to protect yourself, your family and your friends from the risks of computer-driven crimes – crimes like the theft of your personal or financial information or damage to your computer system or online accounts.

Using unsafe internet practices and unsecured devices and networks can expose your finances and good name to a lifetime’s worth of damage.

Thankfully, there are many simple steps that a computer or mobile device user can take to tighten the security around their sensitive data and make their systems more resilient in the face of cyber attacks.

It’s 10 p.m. Do you know where your child(‘s tablet) is?

Where are all of your family’s web-enabled devices? Can you account for them all?

Think of all of the internet-connected devices in your household. Are you keeping track of your family’s smartphones, tablets, laptops, desktops, smart TVs, etc.? Being able to account for all of the web-enabled devices in your household is an important first step in ensuring that your family members’ personal information is safe.

Step two: now that they are accounted for, protect your devices. Update the operating systems and antivirus software on your devices in order to protect against recent viruses and to patch any holes that hackers can use to access your systems.

Take active steps to protect your kids BEFORE they log on.

Keep your home computer in a central location where you can monitor your children’s online usage.

Look for any protection features that are built into the websites and software that your kids access and adjust them accordingly.

All major Internet service providers (ISPs) and cellular providers have tools to help you manage children’s online experiences (e.g., selecting approved websites, monitoring the amount of time they spend online or limiting the people who can contact them).

For these tips and many more, visit the “Raising Digital Citizens” page on the site:

Think before you act.

Ignore unsolicited emails, social media messages, phone calls or texts that create a sense of urgency and require you to respond immediately to a problem...particularly one involving your online account, bank account or taxes. This type of message is likely a scam. When in doubt, don’t respond.

If you question the legitimacy of a message that claims to be from a business or government agency, call the organization directly to inquire. Don’t contact the organization on any phone number provided in the unsolicited call or voicemail and don’t click any links in the email, social post or text message.

Saying goodbye to an old device? Don’t say goodbye to your identity.

Looking to swap out for the latest smartphone? If you are trading in your phone at a retail store, the business will likely transfer your contacts to your new phone and wipe your data off your old phone. That’s great. But what if you intend to donate, resell or recycle your old phone?

Before you turn your old phone over to anyone or throw it in a donation bin, you must remember to completely erase your data and reset the phone to its initial factory settings. Check your phone’s general settings for a factory data reset option. If you don’t know where to go, search online for information about your specific phone model or check with your cellular provider. Additional tips are covered on the Federal Trade Commission’s (FTC) “Disposing of Your Mobile Device” webpage.

If you are getting rid of a desktop or laptop computer, you need to make sure the hard drive is wiped completely clean before you let it go. The FTC’s “Disposing of Old Computers” webpage includes considerations you need to make when disposing of a computer, including the importance of using specialized utility programs to wipe drives.


Westby Times editor

Dorothy Robson is editor of the Westby Times. Contact her at 608-637-5625.

(1) comment


In these times is very important to feel protected and to have quality cybersecurity. There are many times of security. For example, in some cases, companies must resort to private fort worth security for a certain event. But this doesn't mean that the cybersecurity should be ignored. Either you are a public institution or a private person, you must be sure to protect your physical perimeters and also your online presence.

Welcome to the discussion.

Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.
Don't Threaten. Threats of harming another person will not be tolerated.
Be Truthful. Don't knowingly lie about anyone or anything.
Be Nice. No racism, sexism or any sort of -ism that is degrading to another person.
Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts.
Share with Us. We'd love to hear eyewitness accounts, the history behind an article.

Thanks for reading. Subscribe or log in to continue.

Already a subscriber?
Log in or Activate your account.