NSA News & Highlights

Results:
Tag: cybersecurity information

Feb. 22, 2023

NSA Releases Best Practices For Securing Your Home Network

FORT MEADE, Md. — The National Security Agency (NSA) released the “Best Practices for Securing Your Home Network” Cybersecurity Information Sheet (CSI) today to help teleworkers protect their home networks from malicious cyber actors.

March 4, 2021

NSA and CISA Release Cybersecurity Information on Protective DNS

The National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) released a cybersecurity information sheet, “Selecting a Protective DNS Service” on Thursday. This publication details the benefits of using a Protective Domain Name System (PDNS), which criteria to consider when selecting a PDNS provider, and how to effectively implement PDNS.

Sept. 17, 2020

Reduce Risk of Network Compromises

The National Security Agency has released two cybersecurity information sheets (CSIs) with best practices to help National Security System (NSS) and Department of Defense (DoD) teleworkers and their systems administrators secure their networks and handle potential compromises.

Aug. 4, 2020

How Mobile Device Users Can Limit Their Location Data Exposure

The National Security Agency released a Limiting Location Data Exposure Cybersecurity Information Sheet (CSI) today to guide National Security System (NSS) and Department of Defense (DoD) mobile device users on how they might reduce risk associated with sharing sensitive location data. The guide summarizes how and why mobile devices expose location data and explains potential risk that comes with using them. It provides mitigations to limit the sharing of this information, but warns there is no solution to fully mitigate a mobile device from being located.

April 24, 2020

Working from Home? Select and Use Collaboration Services More Securely

Article about NSA's release of cybersecurity guidance about selecting and safely using collaboration services for telework. NSA released a full and a short version of the guidance. By following the practical guidelines listed in this guidance, users can mitigate some of the risks posed by malicious cyber threat actors.