No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Phishing For Cryptocurrencies
Feb 16, 2022 | Cybersecurity, Uncategorized
Phishing for Cryptocurrencies Phishing scams continue to be a major problem and for hackers, it doesn't get old. With the rise of cryptocurrency, the strategy has remained the same: access information by any means necessary. Below are 4 different ways hackers can gain...
School Districts and Cybersecurity
Oct 30, 2020 | Cybersecurity, Uncategorized
Between interrupted zoom calls, to phony emails, this year is gearing up for a higher than ever rate of cyber attacks on school districts. Cybersecurity has been rapidly increasing and in fact, effective September 2019, Governor Greg Abbott signed a bill that would...
Remote Work and Cybersecurity
Oct 7, 2020 | Cybersecurity, Uncategorized
How to make sure that your remote work is as safe from hackers as possible. As our country has shifted to remote work following the outbreak of Coronavirus, this new way of productivity is also having its own risks. In March of this year, the National Cybersecurity...
iPhone Launch Leads To Increase in Scams
Sep 30, 2020 | Cybersecurity, Uncategorized
With the launch of the iPhone 12 approaching, reports have shown scams related to "free trials" have surfaced The Identity Theft Resource Center has reported that there is a scam going around concerning a "free trial" of the iPhone 12. Scammers are targeting mobile...
Avoiding Medical Identity Theft
Sep 30, 2019 | Cybersecurity, Uncategorized
What classifies as medical information? Medical history including past illnesses, surgeries, ongoing conditions, major diagnoses, healthcare insurance and coverage, and prescriptions. Why is medical information stolen? Your medical information is one of the most...
7 Tips to Avoid Being “the Catch” of a Phishy Email
Dec 17, 2018 | Seasonal
92.4% of malware is delivered via email, and with the influx of holiday emails, it's no wonder that this time of year is a favorite for hackers. In between the hustle and bustle of the season, it is easy for a phishy email to slip right through the cracks -- that...
Don’t fall for holiday scams this year
Nov 27, 2018 | Cybersecurity, Uncategorized
This year's holiday shopping is unique in that it will be a cyber-shopping holiday year. This leaves people at an increased risk of fraud. With the COVID-19 outbreak, many more will be shopping online and hackers know this. In fact, as of March, Americans had already...
Hackers Want A Piece of the Pie This Holiday Season
Nov 12, 2018 | Cybersecurity, Uncategorized
After stuffing ourselves with turkey and cranberry sauce, many dream of losing sleep, battling crowds and racing through the aisles of Target to grab the best deals of the season. That’s right, Black Friday (and Cyber Monday) has become a much anticipated holiday...
Baiting
Aug 22, 2018 | Social Engineering Series
Baiting is a type of cyber attack that involves use of a physical object. The hacker places a type of electronic storage media (such as a USB, CD, or external hard drive) near the victim in hopes that they can play off the victim's curiosity. The victim may be eager...
Pharming
Aug 3, 2018 | Social Engineering Series
Pharming is a type of online fraud intended to redirect a website's traffic to a fake site with the purpose of gaining access to personal information that can be used in online identity theft. This scam can be so convincing that even what may appear to be a real...