Cyber Security
Cyber Security: 5 things everyone should do to outsmart online criminals
Cyber Security: 5 things everyone should do to outsmart online criminals 1. Always be suspicious If you receive a video, phone call, voicemail, email, or direct message, try to confirm independently with the sender that it's real. If you don't ...
Cyber Security: Public Networks & Wi-Fi Security
Cyber Security: Public Networks & Wi-Fi Security Public Wi-Fi is widely available, but it can also come with security risks. With so many people relying on public Wi-Fi networks to stay connected on the go, it’s important to understand the dangers ...
Cyber Security: Phishing Attacks
Cyber Security: Phishing Attacks What Is Phishing? Phishing is a fraud technique where a malicious actor sends messages impersonating a legitimate individual or organization, usually via email or other messaging system. Many cyber attackers ...
Cyber Security: The Six Spooky Threats to Your Privacy and Identity
Cyber Security: The Six Spooky Threats to Your Privacy and Identity Summary: This Halloween season and beyond, watch out for data brokers, dark web cybercriminals, and other threats and nuisances creeping around online. These fiendishly persistent ...
Cyber Security: That QR Code Might Not Lead Where You Think It Does
Cyber Security: That QR Code Might Not Lead Where You Think It Does Summary: QR codes are a convenient way to access and share information—but scammers know how to exploit them. If you scan a fraudulent QR code and link to a scam site, you could be ...
Cyber Security: Tax Fraud and IRS Impersonation
Cyber Security: Tax Fraud and IRS Impersonation Here is some helpful information to help you navigate the waters. Scammers often reach out pretending to be IRS employees to get your information. But does the IRS call or text? The first point of ...
Cyber Security: Data Brokers – What Is Your Data Worth?
Cyber Security: Data Brokers – What Is Your Data Worth? A data broker (also known as an information product company) is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to be used by other ...
Cyber Security: Vishing – Are You Getting Too Many Scam Calls?
Cyber Security: Vishing – Are You Getting Too Many Scam Calls? Are You Getting Too Many Scam Calls? 1 in 3 Americans report falling victim to phone scams, with 20% more than once. Total losses to phone scams totaled $39.5 billion in the past 12 ...
Cyber Security: Scammer Alert! If Someone Calls You Using Any of These 12 Phrases You’re About To Be Scammed
Cyber Security: Scammer Alert! If Someone Calls You Using Any of These 12 Phrases You’re About To Be Scammed In an era where phone scams are increasingly sophisticated and widespread, it’s crucial to stay vigilant. Scammers constantly refine their ...
Cyber Security: Title Fraud
Cyber Security: Title Fraud Last month, a much-beloved piece of American history was nearly stolen – but not in a museum heist or a home burglary. Instead, self-proclaimed scammers used a fraudulent real estate scheme. In late May, Graceland, Elvis ...