How-To-Guide for Multi-Factor Authentication

Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cybercriminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, you should consider using multi-factor authentication, also called strong authentication or two-factor […]

Read More

Internet of Things

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive and “Do Your Part. #BeCyberSmart”? Take these simple steps to connect […]

Read More

National Cybersecurity Awareness Month

National Cybersecurity Awareness Month’s second week focuses on steps individuals and organizations can take to secure Internet-connected devices for personal and professional use. This year has seen major disruptions in the way we work, learn, and socialize, driving many of these activities online. With our homes, schools, and business more connected than ever, it’s vital […]

Read More

Cybersecurity Month Tip: E-Skimming

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal […]

Read More

Cybersecurity Month Tip: Identity Theft and Internet Scams

Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go. […]

Read More

National Cybersecurity Awareness Month

The focus of National Cybersecurity Awareness Month’s first week is “If you Connect It, Protect It.” This emphasizes the potential vulnerability of all Internet-connected devices. Cybersecurity starts with YOU and is everyone’s responsibility. There are currently an estimated 4.8 billion Internet users—over 62% of the world’s population!4 This number will only grow, making the need […]

Read More

Cybersecurity Month Tip: Cybersecurity While Traveling

In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling— whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use […]

Read More

Cybersecurity Month Tip: 5 Ways To Be Cyber Secure At Work

Businesses face significant financial loss when a cyber attack occurs. In 2019, the U.S. business sector had 17% increase in data breaches: 1,473 breaches.1 Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the […]

Read More

SSD vs. HDD: What’s the Difference?

Both a solid-state drive (SSD) and hard disk drive (HDD) store computer data and they’re widely used for backups. How data’s stored and accessed is the main difference.   Solid-state drive (SSD) Solid-state drive (SSDs) are a newer type of storage media that uses memory chips to store data. Think of a USB thumb drive (aka […]

Read More

This week’s topic: USB Drop Attacks

Have you ever seen a USB drive on the ground and been curious as to what may be on it? While it may be tempting to let our curiosity get the best of us, plugging in a random USB drive could result in a malicious attack that infects your device and your organization’s network. In […]

Read More