The Power of Updating

Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run…

Comments Off on The Power of Updating

Top Three Social Media Scams

Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage…

Comments Off on Top Three Social Media Scams

Learn a New Survival Skill: Spotting Deepfakes

What Are Deepfakes? The word "deepfake" is a combination of "deep learning" and "fake." Deepfakes are falsified pictures, videos, or audio recordings. Sometimes the people in them are computer-generated, fake…

Comments Off on Learn a New Survival Skill: Spotting Deepfakes

Anyone Can Start a Career in Cybersecurity

Overview We read about cybersecurity in the news almost every day as organizations and governments around the world continue to get hit with ransomware, scams, and cyber attacks. There is…

Comments Off on Anyone Can Start a Career in Cybersecurity

Spot and Stop Messaging Attacks

What are messaging attacks? Smishing (a portmanteau word combining SMS and phishing) are attacks that occur when cyber attackers use SMS, texting, or similar messaging technologies to trick you into…

Comments Off on Spot and Stop Messaging Attacks

Top Cybersecurity Tips For Vacations

Overview As the holiday season approaches, millions of people will be traveling. If you are among the many, here are some tips to help keep you cyber savvy and safe.…

Comments Off on Top Cybersecurity Tips For Vacations

Shopping Online Securely

Overview The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online. Unfortunately, cyber criminals will be…

Comments Off on Shopping Online Securely