National Cybersecurity Awareness Month

  • On ·
  • By ·

October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.

During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.

Topics include:

  • Cybersecurity at Work
  • Cybersecurity While Traveling
  • Identity Theft and Internet Scams
  • E-Skimming
  • Internet of Things
  • Multi-factor Authentication
  • Online Privacy
  • Passwords
  • Phishing
  • Protecting Your Digital Home
  • Social Media Cybersecurity

Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet,
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
Meet the Bitdefender BOX. It's the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and
A world of "smart" devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly

Star Labs Linux Laptops

  • On ·
  • By ·

Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed. They currently offer the Star Lite Mk II and the Star LabTop Mk III at extremely affordable prices.

The Star Lite Mk II delivers up to a 20% performance increase with an Intel® Pentium® N4200 quad-core processor and even faster SSD storage. The low power requirement of this processor and the Type II anodized aluminum chassis eliminate the need for a fan, meaning the Star Lite Mk II is virtually silent.

To the outside world, the Star LabTop Mk III is just an ordinary Linux laptop, but secretly, it is one of the fastest ultrabooks available. The new Star LabTop Mk III delivers up to a 20% performance increase with the new Intel® Core™ i7-8550u quad-core processor and even faster SSD storage. A 45.6-watt-hour battery is housed in the Type II anodized aluminum chassis allowing for a 40% increase in battery life.


Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet,
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
Meet the Bitdefender BOX. It's the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and
A world of "smart" devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly

Little Snitch Firewall for macOS

  • On ·
  • By ·

As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t.

But you don’t notice anything, because all of this happens invisibly under the hood.

Little Snitch makes these Internet connections visible and puts you back in control of your Mac!


Locals is a subscription-based community platform. Made for creators, by creators. This is a place for independent creators to publish content, engage with supporters, and
Major cellular providers are creating unified customer identifiers based on customer account information (name, address, billing information) and unique identifiers on your mobile devices so
Magic Earth is a free maps and navigation app based on OpenStreetMap data. Enjoy 3D maps, Satellite maps, Turn-by-turn navigation, HD Traffic, and Offline maps. Find the
The Social Network Built on Trust, Control and Love MeWe is the rapidly growing high integrity social network with all the social features people love
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the

Nextcloud

  • On ·
  • By ·

Your cloud, your rules!

Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at home, at one of our providers or in a data center you trust.

Nextcloud gives you access to all your files wherever you are. Where are your photos and documents? With Nextcloud you pick a server of your choice, at home, in a data center or at a provider. And that is where your files will be. Nextcloud runs on that server, protecting your data and giving you access from your desktop or mobile devices.

Through Nextcloud you also access, sync and share your existing data on that FTP drive at school, a Dropbox or a NAS you have at home. Nextcloud is free, open source and you can get involved in making it better!


Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet,
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
Meet the Bitdefender BOX. It's the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and
A world of "smart" devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly

Darter Pro Linux Laptop by System76

  • On ·
  • By ·

The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and up to 32GB RAM.

The long battery life allows you to bring your personal office on a remote-work excursion and remove outlets from your sightseeing list. Travel light with the ultra-thin, featherweight chassis that won’t weigh you down. Enjoy the vivid graphics, crisp text, and true-to-life color that breathe life into Darter Pro’s 15.6″ Matte IPS display.

Take advantage of a versatile arrangement of ports, such as an SD card slot and microphone jack that are perfect for content creators. An HDMI and Mini DisplayPort bring you from desk to conference room seamlessly, and a variety of different ports will keep you armed for any scenario.

System76 Laptops run on Pop!_OS which is a Linux distribution designed for professionals and is easy to use making the transition from Windows or Mac extremely easy. Pop!_OS features automatic firmware updates on System76 laptops helping keep your pc secure and reliable.

Pop!_OS encrypts your installation by default and is the only distro that enables full-disk encryption out-of-the box from System76. Pop!_OS does not collect or store any information from user installations. Minimal OS and hardware version data is used (but not stored) to provide firmware and software updates and connectivity verification.


Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet,
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
Meet the Bitdefender BOX. It's the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and
A world of "smart" devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly