recommended reading

Homeland Security names winners in cybersecurity contest

The Homeland Security Department on Monday announced the three winners of a contest to spread the word about safe Internet practices.

A part of Homeland Security's National Cybersecurity Awareness Campaign and the National Initiative for Cybersecurity Education, the Stop.Think.Connect. competition challenged participants to design public service announcements educating citizens on appropriate protective measures to guard against hackers and other threats.

Homeland Security also announced the launch of the Stop.Think.Connect. website at the event.

DHS announced the contest in November 2010 through a video uploaded to its YouTube channel, calling on individuals, nonprofit organizations and corporations to submit videos that would encourage their fellow citizens to be safe and secure online.

Children from the Boys and Girls Club of America and DARE of America attended the White House event alongside representatives from the National Cybersecurity Alliance.

White House Cybersecurity Coordinator Howard Schmidt emphasized that cybersecurity is a shared responsibility among all groups and individuals and praised the winning submissions.

"Today's winners have done way more than I ever thought would happen," Schmidt said.

The three winners' PSAs delivered several messages targeted at teens, young adults and parents. The Woes of Wi-Fi, submitted by three students from Dakota State University, demonstrated the importance of using a secure online network. The nonprofit Stop Child Predators focused its PSA -- Names Hurt -- on cyber bullying, while Microsoft, a partner with the National Cybersecurity Alliance, provided a general overview of the Stop.Think.Connect. campaign.

Commerce Secretary Gary Locke spoke about the broader efforts to educate the public on cybersecurity. Experts expect online transactions will exceed $24 trillion by 2020, he said, adding 67,000 new threats emerge daily on the Internet. Locke also called attention to the other components of NICE, which include bolstering formal cybersecurity education at colleges and universities, and strengthening and developing and the nation's current cybersecurity workforce.

"Consumers simply want to know their personal information is going to be safe from cyber theft and phishing attacks. They must have trust in the Internet to ensure the Web remains a platform for innovation and economic growth," Locke said. "With greater outreach and education we can help minimize the risk of online fraud and crime, and better protect consumers and businesses."

Homeland Security Secretary Janet Napolitano directed her remarks at the children in the audience. "Our culture is changing," she said. "You are the reason Stop.Think.Connect. was created. We're going to give you the information to protect yourselves."

"Woes of Wifi" :

"Names Hurt" :

Microsoft's submission:

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.