This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Journalists / General
How Good Cyber Hygiene Combats Cyber Attacks
By Anthony Cave
11/24/21
CPI logo for blog

How do you know if you’re about to be subject to a cyber attack? You don’t. 

What if it already happened? You likely don’t know that, either. 

That’s why good cyber hygiene is important. From ransomware to journalists having secure communication with sources, the CyberPeace Institute’s Oct. 28 virtual workshop on cyber security reporting touched on many different elements of good cyber hygiene, including GCA’s toolkit for journalists. 

For one, ransomware can be considered a “brand” name. 

Cyber attackers don’t fall under this one, umbrella term, so journalists and media outlets need to go more in-depth when reporting on a ransomware attack, otherwise they risk giving more notoriety to the overarching “ransomware” syntax. 

Who exactly is responsible for the attack? Is it a group of people? One bad actor? And, can it be traced back to anyone? 

Don’t just call it ransomware. 

And, while communicating anonymously is ideal, especially for a journalist talking to sensitive sources, anonymity can also be misused. 

For example, both a cyber attacker and someone publishing sexually explicit content can also be anonymous. 

Finally, cybersecurity attacks tend to fall into two buckets, at least from a company’s perspective. 

Companies either know they’ve been breached or not. Good cyber hygiene ultimately determines if a cyber attack is successful or not. 

Anthony Cave is the Craig Newmark Journalist Scholar with the Global Cyber Alliance. You can follow him on Twitter or connect with him on LinkedIn.

Back to Blog Next Post
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Instructions
Third Party Scan
Video
Third Party Tool
Policy Document

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/