More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which in turn can save us time and money while providing convenience and even safety. These advances in technology are Read More…
Month: October 2019
PROTECT IT. – Be Secure
PROTECT IT. – Identity Theft and Internet Scams
Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go. Read More…
New Cybersecurity Series: PROTECT IT. – Social Media Bots
Overview Social Media Bot programs are common and adaptable to various social media platforms across multiple venues and areas of interest. Social Media Bot usage continues to increase on various social media platforms within the United States. As Social Media Bots increase in usage and utility, malicious behavior via Social Media Bots is also likely Read More…
SECURE IT. e-Commerce (e-Skimming)
Skimming Online Customer Payment Data from Website Checkout Forms The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account Read More…
SECURE IT. – Let’s talk about Phishing yet again.
Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial Read More…
SECURE IT – 5 Ways to be Cyber-Secure at Work
Universities and businesses face significant financial loss when a cyber attack occurs. In 2018, the U.S. business sector had the largest number of data breaches ever recorded: 571 breaches. Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the Read More…
Secure IT – Multi-Factor Authentication (MFA)
A How-To-Guide for Multi-Factor Authentication (MFA) Simple Tips to SECURE IT Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, Read More…
New Cybersecurity Series: SECURE IT – Creating a Strong Password
Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is on of the easiest ways to defend yourself from cybercrime. No citizen is immune to cyber risk, but #BeCyberSmart and you can minimize your chances of an incident. Simple tips to SECURE IT Creating a passwords is Read More…
Own IT – The Internet of Things (IoT)
Perhaps you’ve heard the term Internet of Things, or IoT, but not many have a clear understanding of what they do. IoTs refers to smart devices, any object that is connected to the internet. These set of devices, which can send and receive data over the internet includes cars, appliances, smart watches, lighting devices, Read More…