Showing Results 1 - 20 of 48
  • Social Media Privacy

    Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of their private life - from their health issues to their family and friend's names, ages, jobs, or school locations. But often these same individuals won't think twice about posting that same information on social media. The ramifications of sharing too much can have an impact not only on your personal and professional life but also the lives of your family and friends.

    Download PDF
  • Digital Inheritance

    Have you ever thought about the uncomfortable question, What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Should we consider some type of digital will? Should we create a "digital inheritance" plan?

    Download PDF
  • Messaging / Smishing Attacks

    One of the most common ways cuber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick you with phone calls. However, as technology continues to advance bad guys are always trying new methods, to include tricking you with messaging technologies such as text messaging, iMessage/Facetime, WhatsApp, Slack, or Skype. Here are some simple steps to protect yourself and spot / stop these common attacks.

    Download PDF
  • Four Simple Steps to Staying Secure

    Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.

    Download PDF
  • Scamming You Through Social Media

    Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack attempting to pressure or trick you into taking action you should not take, such as opening an infected email attachment, sharing your password, or transferring money. The challenge is, the more savvy we become at spotting and stopping these email attacks, the more cyber criminals try other ways of contacting a

    Download PDF
  • Got Backups?

    If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware, such as ransomware, may wipe your files and/or hold them captive. At times like these, backups are often the only way you can rebuild your digital life.

    Download PDF
  • Virtual Private Networks (VPNs)

    You may find yourself needing to use public Wi-Fi for internet access when you are away from home, such as when you are at your local restaurant or coffee shop, or when you are traveling at a hotel or airport. But how secure are these public networks and who is watching or recording what you are doing online? Perhaps you do not even trust your ISP (Internet Service Provider) at home and want to be sure they can't monitor what you do online. Protect your online activities and privacy with some

    Download PDF
  • Dark Web

    You may have heard the term "Dark Web" used by others or in the media and wondered "what is the Dark Web?" or "should I be doing anything about it?". Today we explain what the Dark Web is and what it means to you.

    Download PDF
  • A Career in Cybersecurity

    Cybersecurity is something we read about in the news almost every day as organizations and governments around the world continue to get hacked. There is a huge demand for people trained in cybersecurity to help defend against this growing threat. In fact, it is estimated there are almost 3 million openings globally. Have you considered a career as a cybersecurity professional? It is a fast-paced, highly dynamic field with a huge number of specialties to choose from, including forensics, endpoint

    Download PDF
  • Making Passwords Simple

    You are often told your passwords are key to protecting your accounts (which is true), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three simple steps to simplify your passwords, lock down your accounts, and protect your future.

    Download PDF
  • Disposing of Your Mobile Device

    Mobile devices, such as smartphones, smart watches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as frequently as every year. Unfortunately, people often do not realize how much personal data is on these devices. Below we cover what may be on your mobile device and how you should securely wipe it before disposing of it. If you mobile device was issued to you by your employer, or has any work data stored on it, be s

    Download PDF
  • Search Yourself Online

    You most likely have heard how important it is to protect your privacy and the information you share online.  To demonstrate this, we are going to try something new; we are going to show you how to research and discover what information is publicly known about you.  The process is called OSINT, a fancy way of saying Open Source Intelligence.  This means researching public resources on line to see how much information you can learn about a computer IP address, a company, or even a person like you

    Download PDF
  • Personalized Scams

    Cyber criminals continue to come up with new and creative ways to fool people.  A new type of scam is gaining popularly - personalized scams.  Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks.  Below we show you how these scams work and walk you through a common example.  The more you know about these scams, the easier it is for you to spot and stop them. 

    Download PDF
  • Yes, You Are A Target

    Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use technology in anyway, at work or at home, trust us - you have value to the bad guys. But, you are in luck. You already have the best defense there is against these cyber attacks - you.

    Download PDF
  • Am I Hacked?

    Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you identify something bad has happened, the more likely you can fix the problem.

    Download PDF
  • Email Oops, and How to Avoid Them

    Email is still one of the primary ways we communicate, both in our personal and professional lives.  However, we can often be our own worse enemy when using it.  Here are the four most common mistakes people make with email and how to avoid them.  

    Download PDF
  • CEO Fraud/BEC

    Cyber attackers continue to evolve in email attack called CEO Fraud or Business Email Compromise (BEC).  These are targeted email attacks that trick their victim into taking an action they should not take.  In most cases, the bad guys are after money.  What makes these attacks so dangerous is cyber attackers research their victims before launching their attack.  It is also very hard for security technologies to stop these attacks because there are no infected email attachments or malicious links

    Download PDF
  • Smart Home Devices

    Traditionally, only a few of your devices at home could connect to the internet, such as your laptop, smartphone, or gaming console. However, today there are more and more devices connecting to the internet, from your lightbulbs and speakers to your TV, door locks, and even your car. Soon, almost every device in your house could be connected to the internet. These connected devices are often called the Internet of Things (IoT) or smart home devices. While these connected devices bring a grea

    Download PDF
  • Phone Call Attacks & Scams

    When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the internet. While many of today's cyber criminals do use technologies like email or instant messaging, bad guys are also using the phone to trick their victims. There are two big advantages to using a phone. First, unlike email, there are fewer security technologies that monitor phone calls and can detect and stop an attack. Second, it is much easier fo

    Download PDF
  • Stop That Malware

    You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security.  These are different types of malicious programs, called malware, that cyber criminals use to infect computers and devices.  Once installed, they can do whatever they want.  Learn what malware is, what danger it poses, and most importantly, what you can do to protect yourself from it.  

    Download PDF
Showing Results 1 - 20 of 48