2022 Cybersecurity Awareness Campaign

From left to right: Drew Dilly, Kayla Woods, Timothy Sheehan, Kirsten Anderson, Governor Mark Gordon, Aaron Roberts, Jason Strohbehn, and Eric Wagner.

October 5 2022 - Governor Gordon Recognizes National Cybersecurity Awareness Month with a proclamation signing at the Wyoming State Capitol Building in Cheyenne. 

In a recent Facebook post, Governor Gordon shared "raising awareness of computer security essentials will improve the security of Wyoming's information, infrastructure, and economy. Maintaining cybersecurity is a shared responsibility. With proper precautions, we can all do more to protect ourselves from online dangers".

Cybersecurity may seem like a large and complex subject, but really, it’s all about people—beginning with you. We want to help you make smart decisions on the job, at home, at school, and in the future. To learn how you can increase your online security, check back weekly throughout the month for topics on:

We encourage you to explore our partners websites and participate in their theme days, including Women in Tech, International Day, and for anyone interested in exploring a career in cybersecurity, Career Day.

Don’t delay, update your software today!


When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect yourself against attackers who  take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available. 

Some software will automatically check for updates. If automatic updates are available, we recommend you take advantage of them. If you are manually updating software, make sure you are only downloading updates from trusted sources. Do not trust a link in an email. Attackers use email messages to direct users to websites hosting malicious files. You should also be suspicious of email messages claiming to have update files attached —these attachments may contain malware.

Avoid updating software (automatically or manually) while connected to untrusted networks.  If updates must be installed over an untrusted network, use a Virtual Private Network connection to a trusted network and apply updates.

For more information please visit https://staysafeonline.org/resources/software-updates/

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 28 or you can log in here and learn about software updates. 

Phight the Phish!


If a link looks a little off, think before you click it. That link could be an attempt to get sensitive information or install malware on your machine. Phishing is one of the most common types of malware and people often fall victim to these attacks. 

If you are a state employee, you can use the orange hook at the top of your email to report suspicious information. Our team of dedicated cyber-experts can investigate and let you know if it is safe!

It could be a text message or even a phone call. They may pretend to be your email service, your boss, your bank, a friend...The message may claim it needs your information because you’ve been a victim of cybercrime. 


And they may try to get you to run malicious software, also known as malware. Sadly, we are more likely to fall for phishing than we think.   


If it’s a link you don’t recognize, trust your instincts and think before you click. We all need to Phight the Phish! 

To learn more about avoiding phishing and social engineering attempts visit https://www.cisa.gov/uscert/ncas/tips/ST04-014.

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 21 or you can log in here and learn how to recognize and report phishing. 

Strong passwords can protect you from digital forms of crime! 


No matter the account, all passwords should use the guiding principles of LUC (long, unique, and complex). 

You should also reset your password, minimally every few months. It can take companies up to 6 months to notice a data breach has occurred. Resenting your password regularly helps prevent unauthorized access to confidential accounts. 

Finally, use a password manager. A password manager establishes one master password and then generates and retrieves passwords for EVERY account you have! This encrypts and protects your online information, answers to security questions, and more! There are many different free or paid passwords available for personal use. We recommend that you compare the different password managers and find the one that works best for you with these trustworthy guides provided by the National Cybersecurity Alliance:

Visit https://www.cisa.gov/uscert/ncas/tips/ST04-002 for more information on choosing and protecting passwords.


Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 14 or you can log in here and learn how to create strong passwords! 

Don't let bad cyber actors access your information!

Even if you have a complex password, “hackers” can still use computers and other digital devices to gain unauthorized access to information or damage your computer systems. 

Industry is taking a second step towards identifying yourself in your accounts. Multi-Factor Authentication (MFA) is FREE, takes a few minutes to enable, and only seconds to use. MFA uses two steps to authenticate that you are who you say you are. 

If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.



Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 7 or you can log in here and learn how to not be like Rick! 



Watch CISA Director Jen Easterly discuss enabling MFA
and learn how to make yourself, and our nation,
more secure!

Partner Events

Commonly Used Terms:


“Threat Actor” - Covers a variety of cybercriminals—hackers, social engineers, or even shoulder surfers!


“Hackers” - Use computers and other digital devices to gain unauthorized access to information or damage computer systems. Hackers may have impressive computer skills, but expert knowledge of programming is not always necessary for a successful breach. Any attempt by threat actors or hackers to gain unauthorized access to a digital computer system can constitute a cyber attack.

What Is Cybercrime?


Cybercrime is any crime committed electronically, such as theft, fraud and even physical threats and endangerment. It is important to know your cyber basics and know how to take action to protect yourself. Being safe on the computer is similar to being safe in your daily offline routine. You would not leave your car unlocked in the middle of a crowded city, so why not apply those same safety principles to your online life?

What Are Physical Cyber Attacks?


Cyber attacks do not always have to come from the internet, and malware can hide easily on some of the data storage devices we trust and use daily. Physical cyber attacks use hardware, external storage devices or other physical types of attacks to infect, damage or otherwise compromise digital systems. The attack can hitch a ride on USB storage devices or flash drives, CDs, hard copies of video games and Internet of Things (IoT) devices such as smartphones, smart watches and even signal devices such as key fobs.