Morning Overview

Experts urge Americans to take basic steps now to prep for cyberattacks

Federal cybersecurity agencies are pressing Americans to act on a short list of protective steps that cost nothing but could blunt the impact of the next major cyberattack. The push comes as CISA, the FBI, NIST, and the FTC have each published overlapping guidance that converges on the same handful of actions: turn on multi-factor authentication, patch software promptly, use unique passwords, and learn to spot phishing. With cyberattacks against critical infrastructure growing more frequent and attackers able to operate from virtually anywhere in the world, the gap between what experts recommend and what most people actually do remains dangerously wide.

Why Patching Software Comes First

Every major federal cybersecurity body puts software updates at the top of its advice list, and the reason is concrete. CISA maintains a catalog of exploited flaws, an operational dataset of software weaknesses that attackers have already used successfully in the wild. Each entry links to the original CVE record, giving IT teams and individuals a clear, evidence-based signal: these are not theoretical risks but confirmed attack paths. When a phone, laptop, or router prompts for an update, there is a reasonable chance the patch closes one of those documented holes.

Consumer-facing agencies echo the same priority. The FTC’s guidance on protecting personal information stresses that phones, computers, and apps should be configured to update automatically whenever possible. FEMA’s cyber preparedness page states it plainly: keep software and operating systems up to date. The repetition across agencies is not bureaucratic overlap. It reflects a shared assessment that unpatched systems are the single easiest entry point for attackers, and the single cheapest fix for defenders.

For individuals, the practical meaning of “patch promptly” is simple: do not ignore update prompts, especially for operating systems, browsers, and routers. Allow automatic updates where feasible, schedule reboots instead of postponing them indefinitely, and replace devices that no longer receive security updates. For organizations, it means maintaining an inventory of assets, tracking which versions are in use, and applying security patches on a defined schedule, with urgent fixes expedited when active exploitation is reported.

Multi-Factor Authentication and Password Hygiene

Turning on multi-factor authentication, often called MFA or two-factor authentication, is the second step that appears in nearly every federal guide. CISA’s Secure Our World campaign lists MFA alongside strong passwords, timely updates, and recognizing phishing as one of four core actions for everyday users. FBI internet safety materials similarly emphasize two-factor authentication and password hygiene as baseline protections. NIST’s plain-language advice on small cybersecurity steps consistently puts MFA and updates at the center of its recommendations.

The password problem is straightforward: people reuse credentials across sites, and attackers exploit that habit through credential-stuffing attacks that try stolen username–password pairs against dozens of services at once. The FBI’s field offices have repeatedly warned the public to avoid reused passwords, misleading links, and outdated operating systems because those weaknesses tend to cluster together. A single compromised password from one breach can unlock email, banking, and social media if the same combination is used everywhere.

MFA breaks the chain because even a compromised password cannot unlock an account without the second verification step, whether that is a text message code, an authenticator app, or a hardware key. Federal guidance generally favors app-based codes or physical tokens over SMS, but stresses that any second factor is far better than a password alone. For most people, the most impactful move is to turn on MFA first for email, financial accounts, and cloud storage, then extend it to social media and other services that could be abused for impersonation.

Good password hygiene complements MFA rather than replacing it. Agencies recommend using unique passwords for every important account and relying on a reputable password manager to generate and store them. That approach turns the problem from remembering dozens of complex strings into protecting one strong master password and the device it lives on.

What the Data Shows About Adoption Gaps

Knowing what to do and actually doing it are two different problems. CISA released its adoption report on performance goals in January 2025, drawing on enrollment data from 7,791 critical-infrastructure organizations using CISA’s Vulnerability Scanning service between August 1, 2022, and August 31, 2024. The report provides a rare quantitative look at how organizations are, or are not, meeting basic security benchmarks. While the data covers organizations rather than individual households, the pattern it reveals applies broadly: even entities with direct incentives to secure their systems show uneven adoption of fundamental measures such as timely patching and strong authentication.

In some sectors, the report notes relatively strong implementation of technical controls, yet finds that simple governance steps (like clearly assigning security responsibility or maintaining an asset inventory) lag behind. In others, even basic actions such as enabling MFA on remote access tools remain inconsistent. The result is a patchwork of defenses in which sophisticated tools coexist with unaddressed, well-known weaknesses.

No comparable dataset tracks how many individual Americans have enabled MFA on their email or installed the latest operating system update. That gap in consumer-level measurement is itself a problem. Without it, agencies rely on broad campaign messaging rather than targeted interventions, and the public has no benchmark to measure collective progress against. The available evidence from organizational environments suggests that awareness alone does not guarantee follow-through; convenience, perceived complexity, and competing priorities all slow adoption.

Small Businesses Face Outsized Risk

Small businesses and sole proprietorships sit at a particularly exposed intersection. They handle customer data, process payments, and connect to supply chains, yet they rarely employ dedicated security staff. NIST addressed this directly with its draft guidance in NISTIR 7621, focused on cybersecurity for non-employer firms. The document ties its recommendations to the NIST Cybersecurity Framework 2.0, translating an enterprise-grade standard into steps that a one-person business can realistically follow, such as inventorying devices, backing up critical data, and using MFA for any service that touches finances or sensitive records.

Where NIST emphasizes structured risk management, the FTC approaches the same audience from an enforcement perspective. Its security guide for businesses distills lessons from more than 50 data security enforcement actions into practical principles. The failures that triggered those cases were often preventable: weak access controls, unpatched systems, and poor testing. The FTC’s separate small-business cybersecurity materials add specific technical steps like email authentication through SPF, DKIM, and DMARC protocols, rate limiting to block brute-force login attempts, and clear incident-reporting procedures.

The practical takeaway for small-business owners is that regulators already treat basic security as a legal expectation, not just a best practice. Failing to patch known vulnerabilities, encrypt sensitive data, or enforce reasonable password policies can trigger enforcement action, not only a breach. For a small firm, that can mean simultaneous operational disruption, reputational damage, and regulatory scrutiny.

Heightened Threat Periods and What Individuals Can Do

CISA’s Shields Up advisory urges heightened awareness during periods of elevated geopolitical tension, listing simple actions individuals can take alongside guidance for organizations. The agency’s public materials emphasize that during these periods, attackers may increase phishing and social engineering attempts against ordinary users, both for direct financial gain and as stepping stones into larger networks.

For individuals, the recommended steps are deliberately modest and repeatable. First, review critical accounts (email, banking, investment, health portals) and confirm that MFA is enabled and recovery information is current. Second, run available updates on phones, laptops, and routers, paying particular attention to end-of-life devices that no longer receive security patches. Third, back up important data to a location that is not permanently connected to the internet, such as an external drive or a reputable cloud backup service with versioning.

Equally important is behavioral vigilance. CISA and partner agencies urge people to slow down when confronted with urgent requests for money, credentials, or personal information, especially if those requests arrive by unexpected email or text. Verifying through a second channel, such as calling a known phone number rather than using a link in a message, can disrupt common scams. Reporting suspicious emails to employers or service providers helps defenders adjust filters and warn others.

Across all of this guidance, the through line is that a small set of no-cost steps can dramatically reduce the likelihood and impact of common cyber incidents. Keeping software updated, using strong and unique passwords with MFA, backing up data, and treating unsolicited messages with skepticism are not exotic technical measures. They are the digital equivalent of locking doors, installing smoke alarms, and knowing where the fire extinguisher is. Federal agencies have aligned their advice around these basics because they work, if people actually put them into practice.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.