CYBERSECURITY TIPS

CYBERSECURITY TIPS2025-09-05T14:59:52-04:00

Watch Out For Fake Apps.

Beware! Scammers are now creating fake apps. They trick you into downloading them to your smartphone or tablet, and ask you to load your credit card information in these apps. You can guess what happens next. Here are 5 things to keep in mind about this Scam of The Week: Be very judicious in deciding what app to download. Better safe than sorry. If you *do* decide to download an app, check the reviews first; apps with few reviews or bad reviews are a big Red Flag. If you receive an email with a link to download a new app, don't [...]

Categories: Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 30

Keeping Your Personal Information Secure Online Know who you share your information with. Store and dispose of your personal information securely. Be Alert to Impersonators Make sure you know who is getting your personal or financial information. Don’t give out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, [...]

Categories: Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 29

Don’t be Afraid of Multi Factor Authentication It should be obvious that using multi factor authentication (MFA) helps with cybersecurity because it is a combination of three or more authentication factors: Something you know, something you have, and something you are (biometrics). Unfortunately, MFA still gets a bad rep. While most organizations utilize some form of traditional MFA or 2FA, it is universally hated because it’s a nuisance and frustrating to implement and use. Is this bias toward convenience hurting companies? You bet! An analysis of recent breaches shows that if there had been additional authentication factors, the breaches probably wouldn’t have happened. There [...]

Categories: Cybersecurity Tips|

CYBERSECURITY TIP OF THE DAY 25

Protecting Sensitive Data The Information Age has brought with it the ability to share, store, and transmit data with the click of a mouse. The risky part of this equation is that storage and transmission of sensitive data across computer systems can be difficult to protect, increasing the need for vigilance. In the paper world, if a document is marked "Classified" or "Confidential", we can easily protect it by placing it face-down on our desk when someone walks by that does not have a need to know, lock it in a file cabinet when it is not being used, or [...]

Categories: Cybersecurity Tips|
.cyber-tip-container { box-shadow: 0 4px 10px rgba(0,0,0,0.05); transition: all 0.3s ease-in-out; } .cyber-tip-container:hover { box-shadow: 0 6px 14px rgba(0,0,0,0.08); } .cyber-tip-container h2 { text-transform: uppercase; letter-spacing: 1px; }