security

Wrong Number Scams

Unsolicited text messages from unknown numbers have always been a go-to tactic for scammers. But when a message simply says, “Hi,” or “Sorry, wrong number,” curiosity may take over.  In this week’s Micro Training, learn how scammers are carrying out wrong number scams and what to do if you receive one of these mysterious text …

Wrong Number Scams Read More »

Safely Selling Online Items

Where there are buyers and sellers there will be scammers and cybercriminals to keep an eye out for. In this week’s Micro Training, we will discuss online marketplaces and selling platforms so that you’ll be better equipped to face the most common scams found in these types of exchanges.

Top 3 Phishing Saves

Phishing messages come in many forms, with many different ways to catch and respond to them. To wrap up Cybersecurity Awareness Month, we’ll look at the importance of recognizing and reporting an incident by analyzing three different phishing attempts.

Puppet Image

What is Social Engineering?

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week’s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for.

Romance Scams

Love is in the air! Especially when it comes to cybercriminals, who love to use their romance scams to lure in their victims.  In this week’s security tip video, learn about some romance scam red flags and how to help protect you or a loved one. A common sign of a Catfish is someone who avoids video …

Romance Scams Read More »

Two-step and two-factor authentication: What’s the difference?

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can …

Two-step and two-factor authentication: What’s the difference? Read More »