You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.

Showing articles from Security tag

February 2022 - Demystifying Passwords

**Please Open the Attached PDF** Demystifying Passwords 5 Password Myths Debunked How Do Passwords Get Hacked? Password Managers Explained Password Myths Debunked The first use of computer passwords dates back to the early 1960s. Ever since then, they’ve been a source of debate regarding length, complexi…

April 2023:  Digital Spring Cleaning in 7 Simple Steps

April 2023:  Digital Spring Cleaning in 7 Simple Steps Overview We often hear of the term “spring cleaning,” the time of year when we go through our belongings and organize our house and lives in preparation for the upcoming summer. This is also the perfect time to take an annual review of your digital life. The …

November 2021 - Shopping Online Securely

Shopping Online Securely Overview The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online. Unfortunately, cyber criminals will be active as well, creating fake shopping websites and other online shopping scams to steal your information or …

December 2021 - Social Engineering Attacks

Social Engineering Attacks Overview A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by …

November 2022- Emotional Triggers – How Cyber Attackers Trick You

November 2022-  Emotional Triggers how Cyber Attackers Trick You Overview Cyber attackers are constantly innovating ways to trick us into doing things we should not do, like clicking on malicious links, opening infected email attachments, purchasing gift cards or giving up our passwords. In addition, they often…

July 2021- Securely Using Mobile Apps

Securely Using Mobile Apps Overview Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so powerful are the thousands of apps we can choose from. These apps enable us to be more…

September 2021- One Simple Step to Securing Your Accounts

One Simple Step to Securing Your Accounts Overview Does it seem like cyber criminals have a magic wand for getting into your email or bank accounts and there’s nothing you can do to stop them? Wouldn’t it be great if there was one single step you could take that would help protect you from cyber criminals and let y…

June 2021 - Privacy- Protecting Your Digital Footprint

Privacy- Protecting Your Digital Footprint What is Privacy?  There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you would be astounded at all the different entities that not only collect i…

April 2022- Top Three Social Media Scams

April 2022-   Top Three Social Media Scams Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage of millions of people. Don't fall victim to the three most common scams on social media. Investm…

March 2022 – Top Cybersecurity Tips for Vacations

March 2022 – Top Cybersecurity Tips for Vacations Overview As Spring Break approaches, you may betraveling. If you are among the many, here are some tips to help keep you cyber savvy and safe. Mobile Devices Bring as few devices as you can. The fewer devices you bring while traveling, the fewer devices that c…

scroll to top icon