Skip to content

View all posts

Check Fraud Red Flags

Click to see some examples of check fraud schemes. Look for these red flags.

Read More

Tips on Identifying Spoofed Emails

Many spoofed emails are difficult to detect. However, there are several tips for identifying spoofed emails.

Read More

Protect Yourself from Business Email Fraud

If you receive an email from a vendor saying they've changed banks and are requesting you start sending payments to that new bank - please stop, call and verify. Don't send a penny until you have phoned them at the number you have on file to verify the validity of the email. Make that call - don't respond to the email in question to confirm!

Read More

Essential Cybersecurity Tips for Your Small Business

As a small business owner, you may think you're not as much of a target as the larger companies whose data breaches end up in the news. However, businesses with less than 100 employees are increasingly finding themselves targeted in cyberattacks.

Read More

Hack the Human: End-user Training and Tips to Combat Social Engineering

We like to think we can trust our co-workers to do the right thing. Unfortunately, this is not always the case. Some people become insider threats; that is, they use their authorized access to systems to harm their organization. For example, someone may sell information from a database to a third party.

Read More