Introduction The United States of America designates every October as ‘’National Cyber Security Awareness Month’’ (NCAM). Initiated in 2004, the National Cyber security Awareness Month is a collaboration between government —the U.S. Department of Homeland Security — and private industry — the National Cyber Security Alliance, and other partners. The National Cyber Security Awareness Month campaign is aimed at raising awareness about the importance of cyber security (safeguarding digital information) and to increase resiliency in the event of an incident. The National Cyber security Awareness Month campaign is a global call to action. Canada, Europe and other countries have joined the fray. Africa, especially Nigeria must take a cue. The advent of the internet and social media has revolutionized virtually every facet of our daily life. Incidents of cyber attack, hacking, ramsomware are commonplace. Distance is Not A Barrier The inherent danger in cyber attacks is that distance is NOT a barrier. A hacker in North Korea can wreak havoc in Nigeria from the comfort of his bedroom. In September 2017, Equifax Inc., a United States consumer credit reporting agency says a huge cyber security breach compromised the personal information of as many as 143 million Americans — almost half the country. Cyber criminals accessed sensitive information — including names, social security numbers, birth dates, addresses, and the numbers of some driver’s licenses. Washington Post reported in May 2017, how more than 150 countries were affected by massive ramsomware cyber attack. Schools, hospitals, vehicle manufacturing, telecommunications, banks, businesses and other establishments were affected. The malware, deployed in this ransomware cyber attack is known as WanaCrypt0r 2.0, or WannaCry. Also recall that in 2015, a multinational gang of cyber criminals dubbed “Carbanak’’, infiltrated more than 100 banks across 30 countries and stole upwards of one billion dollars over a period of roughly two years. Cyber criminals steal more than £47 million annually through ATM card cloning (skimming) in the United Kingdom. Nigeria’s Minister of Communications, Adebayo Shittu says cyber crime costs Nigeria N 127 billion annually. A recent Kaspersky Cyber security Index estimates that up to 40 percent of people still leave their devices unprotected from online threats. A cybersecurity special report suggests that ransomware will worsen due to the increasing penetration and inherent vulnerabilities in Internet of Things (IoT), medical devices, web cameras, IP Phones, Internet Protocol (IP) CCTV Cameras, DVRs, SmartHouses or SmartCities, wearables such as SmartWatches, public Wi-Fi, and proliferation of mobile Apps with malicious codes, amongst others. Governments alone cannot curb cyberthreats. All hands must be on deck! Be #CyberAware! This explains why the overall theme of the October 2017 cybersecurity awareness month is, ‘’Cybersecurity is a shared responsibility’’. Cyber Safety Tips The United States Department of Homeland Security, DHS, encapsulates online safety best practices in a catchphrase: STOP. THINK. CONNECT. The first step is to STOP: ensure security measures are in place. THINK: about the far-reaching consequences of your actions/online activities. CONNECT: and enjoy your devices with more peace of mind. Take heed of the following cyber safety tips, habits: 1. Be vigilant against ransomware: Ransomware cyber attacks has become one of the biggest cyber security threats. Ransomware is coined from – ‘’ransom’’ – money demanded in return of a captured person or something valuable. Ransomware is malicious software remotely deployed by cyber criminals (cyber-extortionists) to encrypt, hold valuable digital information ‘hostage’ until a ransom is paid. A combination of the following tips will help prevent not just ransomware but other forms of cyber attacks, data breaches. 2. Use strong, unique passwords, pass-codes or touch ID features to lock your devices (or use a password manager): Research says more than half of Internet users choose the same password for everything they do online. Common passwords such as — ‘’123456’’, ‘’QWERTY’’, ‘’password’’, among others are easy to guess and compromise. Instead of the aforementioned common passwords, try using multi word phrase or easy to remember sentence (e.g. I am Passionate About Cyber security); incorporate numbers and special characters such as #@&^. Better still, use two-factor authentication or a password manager. 3. Protect your online identity and security on social media platforms: Social media and messaging platforms – Twitter, Facebook, LinkedIn, Instagram, WhatsApp, amongst others, have become intrinsic part of our daily lives. They help us communicate, network, stay abreast of news and events. Your personal information (date of birth etc.), games you like to play; your contacts list, your itinerary and location are assets to cyber criminals. Be wary who gets such data and which Apps harvest such info. 4. Keep software, Anti-virus, Applications updated: A cyber security rule-of-thumb in securing your personal computer, smart device is keeping your operating system and all software, Applications up-to-date. Software updates help patch vulnerabilities. 5. Secure your Wi-Fi (or use a VPN): When a Wi-Fi or hotspot connection is not secured properly (weak password), it can be an Achilles’ heel for hackers to penetrate. If for some reason you have no choice but to use a public Wi-Fi network (hotspot), ensure you secure your connection by using a VPN (virtual private network). This will ensure your data is encrypted. 6. Should a suspicious process be detected on your computer or device, promptly turn off the Internet connection. This is particularly efficient during the early stage of a cyber attack because the ransomware won’t get the chance to launch a connection with its remote Command and Control server and thus cannot complete the encryption process. 7. Switch off unused wireless connections, such as Bluetooth or infrared ports. Cybercriminals can surreptitiously exploit a Bluetooth to launch a cyberattack or compromise a computer, a mobile device. 8. Tor (The Onion Router) Internet Protocol (IP) addresses or gateways are usually the preferred route for ransomware to communicate with their Command and Control servers. Hence, blockading such IP addresses may impede a malicious malware from infiltrating. 9. When in doubt, throw it out: If an email, link, attachment, social media post, advertisement, picture or video look suspicious, even if you know the source,