Watch Out For Fake Apps.
Beware! Scammers are now creating fake apps. They trick you into downloading them to your smartphone or tablet, and ask you to load your credit card information in these apps. You can guess what happens next. Here are 5 things to keep in mind about this Scam of The Week: Be very judicious in deciding what app to download. Better safe than sorry. If you *do* decide to download an app, check the reviews first; apps with few reviews or bad reviews are a big Red Flag. If you receive an email with a link to download a new app, don't [...]
CYBERSECURITY TIP OF THE DAY 31
CYBERSECURITY IS EVERYONE'S RESPONSIBILITY!
CYBERSECURITY TIP OF THE DAY 30
Keeping Your Personal Information Secure Online Know who you share your information with. Store and dispose of your personal information securely. Be Alert to Impersonators Make sure you know who is getting your personal or financial information. Don’t give out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, [...]
CYBERSECURITY TIP OF THE DAY 29
Don’t be Afraid of Multi Factor Authentication It should be obvious that using multi factor authentication (MFA) helps with cybersecurity because it is a combination of three or more authentication factors: Something you know, something you have, and something you are (biometrics). Unfortunately, MFA still gets a bad rep. While most organizations utilize some form of traditional MFA or 2FA, it is universally hated because it’s a nuisance and frustrating to implement and use. Is this bias toward convenience hurting companies? You bet! An analysis of recent breaches shows that if there had been additional authentication factors, the breaches probably wouldn’t have happened. There [...]
CYBERSECURITY TIP OF THE DAY 28
Take the phishing-quiz below and learn more on how to recognize Phishing Scams. https://www.opendns.com/phishing-quiz/
CYBERSECURITY TIP OF THE DAY 25
Protecting Sensitive Data The Information Age has brought with it the ability to share, store, and transmit data with the click of a mouse. The risky part of this equation is that storage and transmission of sensitive data across computer systems can be difficult to protect, increasing the need for vigilance. In the paper world, if a document is marked "Classified" or "Confidential", we can easily protect it by placing it face-down on our desk when someone walks by that does not have a need to know, lock it in a file cabinet when it is not being used, or [...]