Skip to main content

‘hacker’

Cybersecurity Awareness Month 2017: Block malware from infecting your computer

Oct. 25, 2017—By definition, malware is malicious software that infects computers, resulting in activity against the interests and/or intentions of the computer’s regular user/owner. The effects of malware could be as benign as slower performance and as malignant as loss of data, attacks on other machines, or worse. Trying to recover from data loss or attacks on...

Read more


Cybersecurity Awareness Month 2017: Using multi-factor authentication to protect against identity theft

Oct. 18, 2017—Picture a hacker sitting at the log-in screen moments away from accessing your bank account information. Due to a successful targeted phishing attack, the hacker has successfully obtained your credentials and/or security questions necessary to gain access to your account. He hopes that when he logs in, he’ll be able to transfer funds to any...

Read more


Cybersecurity Awareness Month 2017: Tips to protect yourself from phishing

Oct. 11, 2017—Phishing is an attempt at identity theft using email and fraudulent websites to obtain personal data, such as account names, passwords, social security numbers, credit card numbers or other personal identification information. Criminals and/or hackers will send emails to lists of email addresses they have either found or stolen online. These emails can come from...

Read more


Cybersecurity Awareness Month 2016: Can you spot a malicious or compromised site?

Oct. 27, 2016—Malicious and compromised websites are typically fake sites that resemble their legitimate counterparts down to every detail—except for the URL. Users rarely intend to stumble upon such a site but find themselves here by either mistyping a URL or browsing aimlessly. The term used for these nearly legitimate URLs is known as “typosquatting.” Typosquatting sites...

Read more


Cybersecurity Awareness Month 2016: The 411 on ransomware

Oct. 12, 2016—Ransomware is a type of malware that is frequently delivered through phishing emails to an end user. Today, most variants of ransomware are designed to encrypt files on the infected system and network. This type of ransomware is called crypto-ransomware.  Other variants have been known to erase files. Once blocking access to the system is...

Read more