General Internet Security
Don’t use lazy passphrases Never use a password that anyone could guess or work out - a middle name, pet's name, or favourite football team. Include capital letters, numbers, and punctuation for extra security. Ideally, the best password is one that has so many characters that it could not be guessed by a computer program in a reasonable amount of time, this is a passphrase. Automated guessing in this fashion, known as a "brute force attack", is one of the most common methods used by individuals that steal information with malicious intent. For example... If your preferred password is your pet's [...]
Watch Out For Fake Apps.
Beware! Scammers are now creating fake apps. They trick you into downloading them to your smartphone or tablet, and ask you to load your credit card information in these apps. You can guess what happens next. Here are 5 things to keep in mind about this Scam of The Week: Be very judicious in deciding what app to download. Better safe than sorry. If you *do* decide to download an app, check the reviews first; apps with few reviews or bad reviews are a big Red Flag. If you receive an email with a link to download a new app, don't [...]
CYBERSECURITY TIP OF THE DAY 31
CYBERSECURITY IS EVERYONE'S RESPONSIBILITY!
CYBERSECURITY TIP OF THE DAY 30
Keeping Your Personal Information Secure Online Know who you share your information with. Store and dispose of your personal information securely. Be Alert to Impersonators Make sure you know who is getting your personal or financial information. Don’t give out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, [...]
CYBERSECURITY TIP OF THE DAY 29
Don’t be Afraid of Multi Factor Authentication It should be obvious that using multi factor authentication (MFA) helps with cybersecurity because it is a combination of three or more authentication factors: Something you know, something you have, and something you are (biometrics). Unfortunately, MFA still gets a bad rep. While most organizations utilize some form of traditional MFA or 2FA, it is universally hated because it’s a nuisance and frustrating to implement and use. Is this bias toward convenience hurting companies? You bet! An analysis of recent breaches shows that if there had been additional authentication factors, the breaches probably wouldn’t have happened. There [...]
CYBERSECURITY TIP OF THE DAY 28
Take the phishing-quiz below and learn more on how to recognize Phishing Scams. https://www.opendns.com/phishing-quiz/