Email us at DAF.Cybersecurity.Awareness@us.af.mil
Please see questions below:
FAQ (Frequent Asked Questions)
New tech information will be populated here, providing answers/idea/tips to FAQs.
Q: How can I select a strong password?
A: A strong password makes it difficult for an attacker to guess the password correctly. Avoid using common words, personal information, or common keyboard sequences such as "1234qwerty". When creating a complex password make sure it is long (at least 8 characters, longer if possible) and includes special characters and numbers, example: Cy8er_$ecur!Ty.
Q: Why should I use two-factor authentication (2FA) or multi-factor authentication (MFA)?
A: Using these authentication techniques adds another layer of protection for your accounts by requiring a different form of verification during login.
Q: What is phishing?
A: Phishing is an attempt by cybercriminals to obtain personal information through a pop-up, email or text that usually poses as a legitimate request from a well-known institution, or an institution the user already has a relationship with.
Q: What is cyber hygiene?
A: Cyber hygiene is a the practice of maintaining and forming good habits online to protect yourself and company from any cyber threats and attacks.
Q&A (Questions and Answers)
Feedback provided within 24-72hrs depending on when the request is received.
Q: Do you recommend LastPass?
Feedback: We cannot recommend specific products as doing so would imply Department of the Air Force endorsement. LastPass is one of several similar products, known as password vaults, that allow users to create and store strong passwords so that the user does not re-use passwords on multiple sites. Users should evaluate these products in the context of personal needs and particular usage requirements.
Q: Is VPN necessary on my personal device?
Feedback: Using a VPN (virtual private network) is not required to protect personal information in transit to sites using secure communications technologies such as Transport Layer Security (TLS; look for "https:" in the browser bar). Using a VPN does provides another layer of protection for any activities that don't use TLS. VPNs also provide protection against collection of search queries and general network activity by Internet Service Providers.
Q: What is "Zero Trust?"
Feedback: Zero Trust is a updated technical approach to cybersecurity that requires all access to network resources to be validated with user credentials. This approach reduces the ability of attackers to move laterally within networks once access is gained. The DAF is currently rolling out Zero Trust pilot implementations in various locations.
Q: How is cybersecurity relevant to me?
Feedback: Cybersecurity is relevant to all users because proper security of mission critical data and personal identifiable information is essential to mission success. Exposure of sensitive data can adversely affect mission accomplishment, the ability of Airmen and Guardians to perform assigned tasks, and the security of families and partners.