Text Messaging Attacks: A Smishing Saga
Overview Mark was perplexed by the text message, a package delivery notification from Amazon – “Delivery attempt missed! Click the link now to reschedule or your package will be returned.”
Going On Vacation? Simple Steps to Make it Cybersecure
Overview The summer season is upon us, and soon millions of people will be traveling all over the world. If you are going on vacation, here are some travel tips
Top Three Ways Cyber Attackers Target You
Overview Social engineering attacks, in which adversaries trick people into doing something they shouldn’t, are one of the most common methods that cyber attackers use to target people. The concept
Start A Career in Cybersecurity
Overview As a result of a growing number of hacks on organizations and governments around the world, there is a huge demand for cybersecurity professionals to help defend against today’s
Messaging Do’s and Don’ts
Overview Messaging serves as a primary mode of communication in both our personal and professional lives. However, quite often we can be our own worst enemy when it comes to
Identity Theft: Preventing, Detecting, and Responding
Overview In today’s digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and
QR Codes
Overview Have you ever wondered what those squares of dots or bars called “QR codes” are all about? You most likely have seen them posted on websites, printed on posters,
The Power of the Passphrase
Are you tired of constantly creating complex passwords? Frustrated with having to remember and type all those characters, symbols and numbers? Well, we have a solution for you: the ever-powerful
I’m Hacked, Now What?
Have I Been Hacked? The internet can be overwhelming, with new technologies changing all the time. No matter how safe you try to be, sooner or later you may be
The Power of Updating
Overview Cyber attackers are constantly looking for and finding new vulnerabilities in the software you use every day. A vulnerability is a mistake or weakness in how software was developed.
Online Security for Kids
Background Our kids’ lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the
The Power of Password Managers
Are You Frustrated with Passwords? Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password
Stop Those Phone Call Scams
The Story David was busy watching his favorite streaming series when he got a phone call from a number he did not recognize. The area code was the same as
Securing Your Financial Accounts
Overview Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking
Artificial Intelligence: What you need to know
AI: What is It and Why Should I Care? Artificial Intelligence (AI) describes systems programmed to think and respond like humans. In fact, we asked the AI solution ChatGPT that
Scareware: A Story
Warning! Your computer is infected with Black Basta ransomware. Call this phone number right away to fix your computer! – If you saw this warning pop-up on your computer, would you call
Digital Spring Cleaning in 7 Simple Steps
Overview We often hear of the term “spring cleaning,” the time of year when we go through our belongings and organize our house and lives in preparation for the upcoming summer. This
Do I Need Security Software?
Overview When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However,
Biometrics – Making Security Simple
Overview Do you hate passwords? Are you tired of constantly logging into new websites or can’t remember all of your complex passwords? Frustrated by having to generate new passwords for new
Browsers
Overview Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet. We use them for reading
Got Backups?
Overview If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or
Charity & Disaster Scams
Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways
Phishing Attacks Are Getting Trickier
Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails sent by cyber attackers to
Securely Gaming Online
What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know the people you are playing
The Power of Updating
Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run