Keep up to date
Digital Spring Cleaning in 7 Simple Steps
Overview We often hear of the term “spring cleaning,” the time of year when we go through our belongings and organize our house and lives in preparation
Do I Need Security Software?
Overview When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was
Biometrics – Making Security Simple
Overview Do you hate passwords? Are you tired of constantly logging into new websites or can’t remember all of your complex passwords? Frustrated by having to
Overview Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet.
Overview If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files,
Charity & Disaster Scams￼￼￼￼
Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And
Phishing Attacks Are Getting Trickier
Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails
Securely Gaming Online
What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know
The Power of Updating
Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every
Top Three Social Media Scams
Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals
Learn a New Survival Skill: Spotting Deepfakes
What Are Deepfakes? The word “deepfake” is a combination of “deep learning” and “fake.” Deepfakes are falsified pictures, videos, or audio recordings. Sometimes the people
Anyone Can Start a Career in Cybersecurity
Overview We read about cybersecurity in the news almost every day as organizations and governments around the world continue to get hit with ransomware, scams,
Spot and Stop Messaging Attacks
What are messaging attacks? Smishing (a portmanteau word combining SMS and phishing) are attacks that occur when cyber attackers use SMS, texting, or similar messaging
Top Cybersecurity Tips For Vacations
Overview As the holiday season approaches, millions of people will be traveling. If you are among the many, here are some tips to help keep
Shopping Online Securely
Overview The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online.
Avoid The Most Common Email Mistakes
Overview Email is still one of the primary ways we communicate, both in our personal and professional lives. However, quite often we can be our
One Simple Step to Securing Your Accounts
Overview Does it seem like cyber criminals have a magic wand for getting into your email or bank accounts and there’s nothing you can do
Securely Using the Cloud
Overview You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your
Securing Your Mobile Devices
Overview Mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad
Securely Using Mobile Apps
Overview Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives.
Vishing — Phone Call Attacks and Scams
Overview When you think of a cyber criminal you probably think of an evil mastermind sitting behind a computer, launching sophisticated attacks over the internet.
Privacy – Protecting Your Digital Footprint
What is Privacy? There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect.
What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment
I’m Hacked. Now What?
Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you