Roosevelt University in Chicago, Schaumburg and Online - Logo

National Cyber Security Awareness Month

National Cyber Security Alliance (NCSA) have teamed up with the Department of Homeland Security to help increase awareness about Internet security issues and educate people on how to protect themselves and their devices.

Cyber Security

Cyber Security Awareness Month

When you cross the street, you look both ways to make sure it's safe. Staying safe on the Internet is similar. It takes some common sense steps.


Before you use the Internet, take time to understand the risks and learn how to spot potential problems.


Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family's.


Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer

Protect yourself and help keep the web a safer place for everyone.

“’Stop. Think. Connect.’ is a simple, actionable message that applies to everyone as we connect to the Internet from an array of devices, including laptops, personal computers, smart phones and gaming consoles,” said NCSA Executive Director Michael Kaiser. “Taking a quick moment to evaluate that we are prepared to access the Internet, provide information or engage in the larger community online can increase our sense of personal security, confidence, and peace of mind.”

We have always been thought not to judge a book by its cover, and in the stories the lesson is brought home by revealing that the real monsters aren't always the ones who look scary. Too often we forget these lessons when we're online, leaving us exposed to threats that we don't notice because they don't look like what we would expect a serious online threat to look like.

Connect with Care

When you use social networks you are joining a global community. Therefore, it's smart to approach social networking with a degree of caution.

  • Remember that people may not be who they say they are. If one of your friend's accounts is compromised, you could get spam and suspicious posts.

  • When in doubt, throw it out: Links in tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it's best to delete.

Be a Good Online Citizen

Social networks work best when people maintain the same level of courtesy online as they would in the real world.

  • What you do online has the potential to affect everyone - at home, at work and around the world. Practicing good online habits benefits the global digital community. Safer for me more secure for all.

  • Post only about others as you have them post about you.

  • Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.

Cyber Security Awareness Videos


  • Small Video  (320px - 4MB - Suitable for handheld devices)
  • Large Video  (640px - 17MB - Suitable for all PCs)


  • Small Video  (320px - 4MB - Suitable for handheld devices)
  • Large Video  (640px - 17MB - Suitable for all PCs)

Social Networking

  • Small Video  (320px - 4MB - Suitable for handheld devices)
  • Large Video  (640px - 17MB - Suitable for all PCs)

Identity Theft

  • Small Video  (320px - 4MB - Suitable for handheld devices)
  • Large Video  (640px - 17MB - Suitable for all PCs)


  • Small Video  (320px - 4MB - Suitable for handheld devices)
  • Large Video  (640px - 17MB - Suitable for all PCs)

Cyber Security Awareness Month

FREE Microsoft Cyber Security Book

Own Your Space: Keep Yourself and Your Stuff Safe Online -- by Linda McCarthy

Written for computer and Internet savvy "tweens" and teens, this book is also a useful resource for the adults they rely on.

This book is designed for any teen or parent who is:

  • In fear of drive-by downloads of nasty adware, spyware, and viruses
  • Anxious about scareware and ransomware
  • Trying to stay safe on social networking sites
  • Concerned about online predators and identity thieves
  • Scattering secrets to the wind in favorite hot spots
  • Shopping online without protection
  • Unsure of the risks about webcams and sexting
  • Dealing with cyberbullies at home or in school
  • Blogging alone and in the dark

Download Options

  • PDF | XPS -- Entire book
  • PDF | XPS -- Chapter 1:  Protect Your Turf
  • PDF | XPS -- Chapter 2:  Know Your Villains
  • PDF | XPS -- Chapter 3:  Nasty "ware"
  • PDF | XPS -- Chapter 4:  Hackers and Crackers
  • PDF | XPS -- Chapter 5:  Taking SPAM Off the Menu
  • PDF | XPS -- Chapter 6:  Cyberbullies
  • PDF | XPS -- Chapter 7:  Phishing for Dollars
  • PDF | XPS -- Chapter 8:  Safer Cyber Shopping
  • PDF | XPS -- Chapter 9:  Browsers Bite Back
  • PDF | XPS -- Chapter 10:  Private Blogs and Public Places
  • PDF | XPS -- Chapter 11:  Going Social
  • PDF | XPS -- Chapter 12:  Friends, Creeps, and Pirates
  • PDF | XPS -- Chapter 13:  Any Port in a Storm
  • PDF | XPS -- Chapter 14:  Look Pa, No Strings
  • PDF | XPS -- Chapter 15:  Getting Help
  • PDF | XPS -- Chapter 16:  Tweaks
  • PDF | XPS -- Appendix