Securely Using the Cloud

Overview You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your data. Examples include creating documents…

Comments Off on Securely Using the Cloud

Securing Your Mobile Devices

Overview Mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since these…

Comments Off on Securing Your Mobile Devices

Securely Using Mobile Apps

Overview  Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so…

Comments Off on Securely Using Mobile Apps

Vishing — Phone Call Attacks and Scams

Overview When you think of a cyber criminal you probably think of an evil mastermind sitting behind a computer, launching sophisticated attacks over the internet. While some of today’s cyber…

Comments Off on Vishing — Phone Call Attacks and Scams

Privacy – Protecting Your Digital Footprint

What is Privacy? There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you…

Comments Off on Privacy – Protecting Your Digital Footprint

Identify Theft

What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a…

Comments Off on Identify Theft

I’m Hacked. Now What?

Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and…

Comments Off on I’m Hacked. Now What?