Skip to content

Phishing 101

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the information or click on a link, attackers use it to access users' accounts.

Read More

Social Media Cybersecurity

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. Take these simple steps to connect with confidence and safely navigate the social media world.

Read More

Staying Cyber-Safe on Vacation

Typical travelers heading out on their vacation check that they have the right supplies and clothes for their trip before they hit the road. Expert travelers will be also checking to ensure they are educated and prepared to be cyber-safe with their devices and data while on the road!

Read More

E-Skimming

E-skimming is when online consumer payment data is stolen from website checkout forms. Cyber criminals introduce skimming code on payment card processing web pages to capture credit card and personally identifiable information and send the stolen data to a domain under their control.

Read More

5 Steps to Protecting Your Digital Home

More and more of our home devices - including thermostats, door locks, coffee machines, and smoke alarms - are now connected to the Internet. This enables us to control our devices from our smartphones, no matter where we are, which is a great convenience. Such advances in technology are innovative and intriguing; however, they also pose a new set of security risks.

Read More