Protect Your Data

Forward by CyberWyoming:

Join a program to learn how to manage and secure your customer’s data more effectively, join Wyoming’s Wyoming’s Cybersecurity Competition for Small Business.
Registration period: now through May 1 Registration form and information:
Competition start date: Feb 1 Competition end date: Aug 1
Cash prizes for WINNERS who speak at Wyoming’s Cybersecurity Conference! 

Because your computer didn’t come with a privacy and security manual.

About Data Privacy Week:

Data Privacy Week is an annual campaign to spread awareness about data privacy and educate individuals on how to secure their personal information.

All your online activity generates a trail of data. Websites, apps, and services collect data on your behaviors, interests, and purchases. Sometimes, this includes personal data, like your Social Security and driver’s license numbers. It can even include data about your physical self, like health data – think about how a smartwatch counts and records how many steps you take.

While it’s true that you cannot control how each byte of data about you and your family is shared and processed, you are not helpless! In many cases, you can control how you share your data with a few simple steps. Remember, your data is precious, and you deserve to be selective about who you share it with!

Here is the THIRD simple, easy tips you that will help you manage your data privacy:


Data privacy and data security go hand-in-hand. Along with managing your data privacy settings, follow some simple cybersecurity tips to keep it safe. We recommend following the Core 4:

  • Create long (at least 12 characters), unique passwords for each account and device. Use a password manager to store each password – maintaining dozens of passwords securely is now easier than ever.
  • Turn on multifactor authentication (MFA) wherever it is permitted – this keeps your data safe even if your password is compromised.
  • Turn on automatic device, software, and browser updates, or make sure you install updates as soon as they are available.
  • Learn how to identify phishing messages, which can be sent as emails, texts, or direct messages.

The CyberWyoming Alliance Challenge

Tell us you’ve reviewed the security settings on 3 different online accounts and get a congratulatory letter and a webcam cover!  Just email us at with your mailing address.  (No, we won’t keep your address on file.)


Register to Receive the Tech Joke of the Week!

This Week's Joke:

How many programmers does it take to change a light bulb?

None, it is a hardware problem!

More Posts: