October is Cybersecurity Awareness Month

Oct 26, 2021 | Cyber Security, IT News

October is officially designated as National Cybersecurity Awareness Month. If you didn’t know, that’s quite alright, because today we’ll be delving into its history, why it exists and how you can best observe it, no matter what month of the year it is.

When did Cybersecurity Awareness Month begin?

National Cybersecurity Awareness Month started back in 2004. It was first launched by the National Cyber Security Alliance and the U.S. Department of Homeland Security in October of that year as a broad effort to help all Americans stay safer and more secure online.

How did Cybersecurity Awareness Month begin?

NCAM originally had slightly more humble beginnings. When it first started, the awareness efforts centered around simple advice like updating your antivirus software twice a year in the same way you might change batteries in smoke alarms during Daylight Saving time. Small, generic tips like that make little sense today of course. But since then, NCSA and DHS have combined efforts, and the month has grown in both reach and participation. It now includes multiple industries that engage customers, employees and the general public in awareness — as well as college campuses, nonprofits and other various groups.

How do you observe Cybersecurity Awareness Month?

In order to observe National Cybersecurity Awareness Month, the Cybersecurity and Infrastructure Security Agency (CISA) would like everyone in the U.S. to take heed of the following:

Cybersecurity at Work

Businesses face significant financial loss when a cyberattack occurs. Cybercriminals often rely on human error — employees failing to install software patches or clicking on malicious links — to gain access to systems. From the top leadership to the newest employee, cybersecurity requires everyone to keep their data, customers and capital safe and secure.

Cybersecurity while Traveling

In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling, whether domestic or international, it is always important to practice safe online behavior and take proactive steps to secure internet-enabled devices. The more we travel, the more we are at risk for cyberattacks.

Identity Theft and Internet Scams

Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes and cars from our smartphones. With this added convenience comes an increased risk of identity theft and internet scams.

Multi-factor Authentication

You should be using multi-factor authentication, also called strong authentication, or two-factor authentication. This technology may already be familiar to you, as many banking and financial institutions require both a password and one of the following to log in: a call, email or text containing a code. By applying these principles of verification to more of your personal accounts, such as email, social media and more, you can better secure your information and identity online.

Online Privacy

The internet touches almost all aspects of our daily lives. We can shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords and location information. Beware the types of sites you allow to have this information.

Passwords

Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime.

Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords or Social Security numbers. When users respond with the information or click on a link, attackers use it to access users’ accounts.

Cybersecurity needs to be practiced all year long, rather than simply one month a year. But October is a great time to remember the basics. And for year-round guidance and 24/7 protection, you can rely on us.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

Why Agentic AI Changes Everything for Cybersecurity — and What Businesses Must Do in 2026

Agentic AI is changing the cybersecurity landscape by enabling autonomous, adaptive attacks at unprecedented scale. This blog explains what agentic AI means for businesses in 2026 — and how MSPs help protect against emerging AI-driven threats.

The 2026 Cyber Readiness Checklist: What Every Business Should Complete Before January 1

Before heading into the new year, every business should pause and assess its cybersecurity posture. This 2026 Cyber Readiness Checklist outlines the essential steps organizations should complete before January 1 to reduce risk, improve security, and prepare for compliance requirements.

Cybersecurity in 2026: The Trends Small Businesses Can’t Afford to Ignore

As we head into 2026, small businesses face a rapidly evolving cyber threat landscape driven by AI-powered attacks, stricter cyber insurance requirements, and expanding hybrid-work vulnerabilities. This blog breaks down the top cybersecurity trends SMBs can’t afford to ignore—and why proactive planning and protection are more essential than ever.

2025 Cybersecurity Wrap-Up: The Biggest Lessons Government Contractors Can’t Ignore in 2026

2025 reshaped cybersecurity for government contractors — from the CMMC Final Rule to rising AI-powered attacks. This blog breaks down the biggest lessons of the year and how to prepare for 2026.

After the Shutdown: How Government Contractors CAN Recover — and Prepare for the Next One

The recent shutdown increased cybersecurity risk for government contractors — from missed patches to reduced monitoring. With another shutdown possible in January, proactive planning is now essential. Learn how to recover securely and prepare for the next one.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic