Skip to main content

Blog

  • November 2020 - Social Engineering Attacks

    Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by simply tricking you into doing it for them using a technique called social engineering.

  • Phishing

    Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information.

  • Creating a Password

    Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime.

  • 5 Steps to Protecting Your Digital Home

    More and more of our home devices—including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet.

    These advances in technology are innovative and intriguing, however they also pose a new set of security risks. #BeCyberSmart to connect with confidence and protect your digital home.

     

  • Don't Become a Target

    An official-looking envelope arrives in the mail with a check or money order for$20,000 inside.
    The letter says you have won$4 million in a sweepstakes or lottery. You just need to wire $3,000 for taxes to claim the rest of your winnings.

    Is this your lucky day?

    NO! It is a fake check scam that will cost you thousands. 

  • A How-To Guide for Multi-Factor Authentication

    Multifactor authentication (MFA) is defined as a security process that requires more than one method of authentication from independent sources to verify the user’s identity.

  • E-Skimming

    The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information.

  • Identity Theft & Internet Scams

    Did you know - 

    • The average cost of a data breach for a US company in 2019 was $8.19 million? That's an increase of 130% since 2006!
    • 7-10% of the U.S. population are victims of identity fraud each year, and 21% of those experience multiple incidents of identity fraud.
  • Stay Safe From Cybercime During Tax Time

    Tax season is primetime for online scams. The National Cyber Security Alliance (NCSA) and the Identity Theft Resource Center (ITRC) have once again joined forces to help consumers keep safe during tax season with tips for identifying cyber scams, actionable online safety steps and what to do if you fall victim to tax identity theft.

  • Cybersecurity While Traveling

    In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When
    you’re traveling— whether domestic or international—it is always important to practice safe online behavior and
    take proactive steps to secure Internet-enabled devices.

  • October 2020 - Fake News

    Fake news is a false narrative that is published and promoted as if it were true.

     

  • Online Privacy

    #BeCyberSmart when sharing personal information online to reduce the risk of becoming a cybercrimes victim.

  • Remain Cyber Secure At Work

    From the top leadership to the newest employee, cybersecurity requires the vigilance of everyone to keep data, customers, and capital safe and secure. 

  • September 2020 - Online Security For Kids

    Kids' lives are online more than ever, from socializing with friends and interacting with family to online learning and education. As parents we want to make sure they do so in a safe and secure manner.

  • August 2020 - Virtual Conferencing Safely and Securely

    With so many of us now working from home, you are most likely finding yourself remotely connecting with your co-workers using virtual conferencing solutions like Zoom, Slack, or Microsoft Teams. Your family members - perhaps even your children – may also be using these same technologies to connect with friends or for remote learning. Regardless of why you are connecting, here are key steps you can take to make the most of these technologies safely and securely.

Scroll to top of page