Gone Phishing

Don’t Take the Bait Phishing attacks are fraudulent email messages appearing to come from a legitimate source (e.g., your supervisor, HR, or your bank). These messages include links pointed to fake websites, or allow malicious programs to run in the background of your computer, in an attempt to collect private information.   It is impossible[…]

Don’t Forget to Secure Your Mobile Devices

Smartphones and tablet computers are convenient tools to mobile workers, but they introduce a ton of security risks. Here are some do’s and don’ts to ensure you stay safe as possible while using these devices:   DO configure your devices securely. That means enabling auto-lock with an unlock password, creating a strong complex password, disabling[…]

Protect Yourself From Identity Theft

ID theft is real … these eight steps can secure your identity for less.   1. Get serious, not scared Don’t let the horror stories freak you out. The worst-case scenario—where someone opens new credit-card accounts or commits other crimes using your name, Social Security number, or other information—is relatively uncommon. That nightmare happened to less[…]

Can You Spot a Spoofed Email Address?

Making emails look as if they came from a trusted colleague or friend is a critical tool used by attackers.   It’s easy enough to fake what appears in the “from” or “reply- to” line of an email message. That’s the bad news. The good news? If you dig a little deeper, you can usually[…]

Helpful Tips to Keep Your Mobile Device Secure

As mobile devices increase in popularity, cybercriminals are continuously looking for ways to exploit vulnerabilities in apps, operating systems, and so ware. It does not matter which type of phone you have. Not taking care of your phone could lead to the theft of credit card credentials, e-mail passwords, and contact lists. The following are[…]