Skip to main content

Blog

Personalized Scams

Cyber criminals now have a wealth of information on almost all of us. With so many hacked organizations now a days, cyber criminals simply...
Read More

When Away

Leaving your seat? Ctrl–Alt–Delete! Make sure you lock your workstation or laptop while you are away from it. On a Mac? Try Control–Shift–Eject/Power. To...
Read More

Kids and Screenshots

If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to...
Read More

Reporting an Incident

Bad guys are very persistent, eventually anyone can make a mistake. If a phone call from the “Help Desk” doesn’t sound quite right, if...
Read More

Securely Disposing Mobile Devices

Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing...
Read More

Email Auto-Complete

Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the...
Read More

Mobile Apps

Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information. To...
Read More

Ransomware

Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome...
Read More

Shopping Online

When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your...
Read More

Search Yourself Online

Ever wonder just how much information is publicly available about you? Ever wonder how cyber criminals harvest information and customize attacks for their victims....
Read More