Securely Using Mobile Apps

Overview  Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so…

Comments Off on Securely Using Mobile Apps

Vishing — Phone Call Attacks and Scams

Overview When you think of a cyber criminal you probably think of an evil mastermind sitting behind a computer, launching sophisticated attacks over the internet. While some of today’s cyber…

Comments Off on Vishing — Phone Call Attacks and Scams

Privacy – Protecting Your Digital Footprint

What is Privacy? There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you…

Comments Off on Privacy – Protecting Your Digital Footprint

Identify Theft

What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a…

Comments Off on Identify Theft

I’m Hacked. Now What?

Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and…

Comments Off on I’m Hacked. Now What?