Safely Selling Online Items

Where there are buyers and sellers there will be scammers and cybercriminals to keep an eye out for. In this week’s Micro Training, we will discuss online marketplaces and selling platforms so that you’ll be better equipped to face the most common scams found in these types of exchanges.

Top 3 Phishing Saves

Phishing messages come in many forms, with many different ways to catch and respond to them. To wrap up Cybersecurity Awareness Month, we’ll look at the importance of recognizing and reporting an incident by analyzing three different phishing attempts.

The Future of Fraud

The success of scammers is dependent on them staying one step ahead of their potential victims. By forecasting the future of fraud, we can keep pace with the scams that may target us in the future.  In this week’s security tip video, learn some of the possible future trends in cybercrime to stay ahead of …

The Future of Fraud Read More »

Puppet Image

What is Social Engineering?

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week’s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for.

Here’s why you need a VPN and how to choose one

Installing antivirus software and using strong passwords are no longer considered the bare minimum in cybersecurity. With your online activities transparent to internet service providers, third parties, and hackers alike, it’s important to keep your information secure and private by using a virtual private network (VPN). Here’s why. What is a VPN? A VPN creates …

Here’s why you need a VPN and how to choose one Read More »

Fileless malware: Are you at risk?

Over the past few years, the security industry has witnessed a rapid evolution in attack techniques, including fileless malware. Now, cybercriminals use legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities like unauthorized data retrieval or data damage. Left unchecked, these types of malware can adversely affect …

Fileless malware: Are you at risk? Read More »