Skip to main content

‘phishing’

Cybersecurity Awareness Month 2017: Tips to protect yourself from phishing

Oct. 11, 2017—Phishing is an attempt at identity theft using email and fraudulent websites to obtain personal data, such as account names, passwords, social security numbers, credit card numbers or other personal identification information. Criminals and/or hackers will send emails to lists of email addresses they have either found or stolen online. These emails can come from...

Read more


Cybersecurity Awareness Month 2016: Can you spot a malicious or compromised site?

Oct. 27, 2016—Malicious and compromised websites are typically fake sites that resemble their legitimate counterparts down to every detail—except for the URL. Users rarely intend to stumble upon such a site but find themselves here by either mistyping a URL or browsing aimlessly. The term used for these nearly legitimate URLs is known as “typosquatting.” Typosquatting sites...

Read more


Cybersecurity Awareness Month 2016: 8 ways to protect yourself from identity theft

Oct. 19, 2016—Identity theft has progressively become a serious problem that claims innocent bystanders as victims every day. Preventing identity theft begins with understanding the basics of managing your personal information carefully and sensibly. By following these eight precautions, you can help protect your identity and personal information: Be careful saving and storing information on your computer....

Read more


Cybersecurity Awareness Month 2016: The 411 on ransomware

Oct. 12, 2016—Ransomware is a type of malware that is frequently delivered through phishing emails to an end user. Today, most variants of ransomware are designed to encrypt files on the infected system and network. This type of ransomware is called crypto-ransomware.  Other variants have been known to erase files. Once blocking access to the system is...

Read more


Cybersecurity Awareness Month 2016: Tips to protect yourself from phishing

Oct. 5, 2016—Phishing is an attempt at identity theft using email and fraudulent websites in order to obtain personal data, such as account names, passwords, social security numbers, credit card numbers or other personal identification information. Criminals will send emails to lists of email addresses they have either found or stolen online. These emails can come from...

Read more