Understanding Firewalls

September 2, 2020

If your computer is always on or you surf for long periods of time, you should have a firewall set up. Firewalls help stop hackers from getting into your computer and stealing personal information. They also can put your computer in stealth mode and automatically make your computer invisible to anyone on the Internet. By […]

Cybersecurity Vulnerabilities

September 2, 2020

The following are some of the major cybersecurity vulnerabilities in today’s environment*: Email If you were to ask the average consumer what account is the most important for them to keep safe and secure, you might expect them to say their bank account, PayPal, or perhaps a government portal login. However, while highly sensitive, these […]

How to Spot, Avoid and Report Tech Support Scams 

September 1, 2020

Tech support scammers want you to believe you have a serious problem with your computer, like a virus. They want you to pay for tech support services you don’t need, to fix a problem that doesn’t exist. They often ask you to pay by wiring money, putting money on a gift card, prepaid card or […]

Get a contact tracing call? 5 things to know before you respond

September 1, 2020

A contact tracer from your state health department might call if you’ve been exposed to COVID-19. But scammers are pretending to be contact tracers, too. Here’s how you can spot the scam. View the infographic from the FTC

Adware

September 1, 2020

Adware is unwanted software designed to throw advertisements up on your screen, most often within a web browser. Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.

Ransomware

September 1, 2020

Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back. Ransomware has been called the cyber criminal’s weapon of choice because it demands a quick, profitable payment in hard-to-trace cryptocurrency. The code behind ransomware is easy to obtain through […]