Protected Voices: Patching, Firewalls, and Anti-Virus Software

Hello, I’m Henry, a special agent with the FBI. If you’re working for a political campaign, it’s critical that you protect your campaign’s network environment. In this video we’ll cover three specific ways to keep your network safe: software patches, anti-virus software, and firewalls. Patching is the installation of software updates on computers, routers, and…

Protected Voices: Ransomware

Hello, my name is Jim, and I’m a special agent with the FBI. In this video I want to help you recognize, understand, and protect yourself from ransomware attacks. Ransomware is a type of cyberattack in which an adversary accesses your computer and encrypts your data, which can cripple your campaign. Once you realize you…

Protected Voices: Browser and App Safety

Your campaign personnel at every level are almost certain to be using web browsers and mobile applications as they perform work duties with official and non-official devices. These tools are essential for research and communications, but they could also be openings through which bad actors may intrude into your systems. Hi, I’m Pyroe, an intelligence…

Protected Voices: Social Engineering

Hello, I’m Jay, a special agent with the FBI. Welcome to social engineering—or, more bluntly, targeted lies designed to get you to let your guard down. Social engineering is the most common technique deployed by criminals, adversaries, competitors, and spies to exploit humans and computer networks. That’s because it’s all too simple—you don’t need any…

Protected Voices: Business Email Compromise

Hello, I’m Jay, a program coordinator for the FBI. In this video I’ll discuss how to recognize and protect your campaign from a type of fraud known as business email compromise. In a business email compromise scheme, the hacker gets to an organization’s email system and, after watching and studying the normal course of business…

Protected Voices: Information Security (InfoSec)

Hi, I’m Jason, a special agent with the FBI. Information Security is the protection of your data. When we refer to InfoSec, we’re also referencing your policy detailing responsibilities and expectations of your campaign’s employees. Humans are almost always the weakest link in any computer network. Even the strongest security measures can be rendered useless…

Protected Voices: Router Hardening

Did you know there is one device that all your traffic goes through? Your emails, your web surfing, your smart refrigerator—they all connect to the Internet through one device: your router. Hi, I’m JR, a special agent with the FBI. I’m here to share some tips to make your Internet router more secure. Your router…

Protected Voices: Safer Campaign Communications

Hi, I’m Erica, a computer scientist with the FBI. In this video, we’ll talk about how a few proactive communication practices can effectively enhance your campaign’s overall cybersecurity. Given the importance of communications to a campaign, both in managing its operations as well as connecting with voters, it’s no surprise that communications also represent a…

Protected Voices: Wi-Fi

Hi, I’m Raushaunah, a special agent with the FBI. I’m here to talk about some of the dangers associated with using public Wi-Fi. Campaigns today need to connect in real time to potential voters, campaign workers, and volunteers. However, you’ve got to take precautions to secure your communications and online activity. This is especially true…

Protected Voices: Have You Been Hacked?

Hi, I’m Ronnee, a staff operations specialist with the FBI. Today I’m going to talk about possible indicators that your computer system or devices may have been hacked. However, before delving into those, I want to emphasize the importance of adhering to the cybersecurity principles outlined in the other videos in this series. Chances are,…