Skip to main content

Blog

  • Blueprint of a Phishing Attempt

    It would be helpful if content from threat actors came with a flashing red flag. Unfortunately, phishing attempts are better crafted than we'd like to believe. Cyber threat actors are well versed in manipulation and well-crafted techniques to fool unsuspecting users. When a user falls for a phishing message, the attacker achieves their purpose.

  • Biometrics – Making Security Simple

    Do you hate passwords? Are you tired of constantly logging into new websites or can’t remember all of your complex passwords? Frustrated by having to generate new passwords for new accounts or having to change old passwords for existing accounts? We have good news for you. There is a solution called biometrics that helps make cybersecurity easier for you. Below we explain what biometrics are, how they make your life simpler and why you will start seeing more of them.

  • Cybersecurity Month - Tips to Protect Your Identity

    When you log on to a website, make an online payment, send an email, use a social network, post online, or even send a text, you're adding to your online identity. In today’s world, it is unavoidable. The good news is there are ways you can protect yourself.

  • Cybersecurity Month - Social Engineering and Ways to Avoid It

    Social engineering is the art of manipulating or deceiving you into taking an action or divulging sensitive information. It is important to know the different kinds of attacks to watch out for and how you should react.

  • Scam of the Week: Using Quickbooks to Make a Quick Buck

    Cybercriminals have targeted QuickBooks users for their latest phishing scam. 

  • July 2022 - Phishing Attacks Are Getting Trickier

    Phishing attacks have become the most common method cyber attackers use to target people at work
    and at home. While traditional phishing attacks continue today, many cyber attackers
    are creating advanced phishing emails that are more customized and harder to detect. They are also using
    technologies such as text messaging, social media, or even telephone calls to engage and fool you.

     

  • June 2022 - Securely Gaming Online

    What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know the people you are playing with.

    The greatest risk to online gaming is not the technology itself but the interactions you have with strangers.

  • April 2022 - Top Tips for Personal Security

    Here are a few tips to avoid data theft, financial loss, or malware infections:

  • 'Tis the Season for Online Romance Scams

    Look for red flags and know what action to take if you believe you or someone you know has become the victim of a scam. 

  • YOUR Bank's Upgrades

    EXCITING changes are coming your way on March 21!

    The same great service you've come to expect, plus upgrades to 
    improve YOUR banking experience!

    Improved Digital/Mobile App Features

    Enhanced Online Banking Tool for our Business Clients

    Voice Response Access for Automated Phone Calls

     

  • January 2022 - Spot and Stop Messaging Attacks

    Messaging attacks are attacks that occur when cyber attackers use SMS, texting, or similar messaging technologies to trick you into taking an action you should not take. 

    A common scam is a message telling you that you won an iPhone, and you only need to click on a link and
    fill out a survey to claim it.

     

  • December 2021 - Cybersecurity Tips For Vacations

    Traveling for the holidays? Planning a trip for next year? Be sure you are up to speed on these cybersecurity tips for travel...

     

  • THE 12 SCAMS OF CHRISTMAS

    Over the holidays, there is often an uptick in scams and fraud.

    Be on the lookout for the Better Business Bureau's "12 Scams of Christmas".

     

  • Week 4 of Cyber Security Month - Identity Theft & Internet Scams

    Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams.

    #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.

  • Week 4 of Cyber Security Month - Best Practices for Using Public Wifi

    Public Wi-Fi networks can now be found almost everywhere – in airports, coffee shops, libraries, restaurants, malls, and hotels – making it easy for anyone to connect to the Internet wherever they are. Although these Wi-Fi hotspots can be convenient, they are not always secure, potentially exposing you to online risks and presenting an opportunity for cybercriminals to steal sensitive information. It is important to understand these risks and take measures to protect yourself while connecting to Wi-Fi networks.

Scroll to top of page