Pretexting Defined

September 2, 2020

Pretexting* is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. An elaborate lie, it most often involves some prior research or setup and the use of […]

Understanding Firewalls

September 2, 2020

If your computer is always on or you surf for long periods of time, you should have a firewall set up. Firewalls help stop hackers from getting into your computer and stealing personal information. They also can put your computer in stealth mode and automatically make your computer invisible to anyone on the Internet. By […]

Cybersecurity Vulnerabilities

September 2, 2020

The following are some of the major cybersecurity vulnerabilities in today’s environment*: Email If you were to ask the average consumer what account is the most important for them to keep safe and secure, you might expect them to say their bank account, PayPal, or perhaps a government portal login. However, while highly sensitive, these […]

How to Spot, Avoid and Report Tech Support Scams 

September 1, 2020

Tech support scammers want you to believe you have a serious problem with your computer, like a virus. They want you to pay for tech support services you don’t need, to fix a problem that doesn’t exist. They often ask you to pay by wiring money, putting money on a gift card, prepaid card or […]

Get a contact tracing call? 5 things to know before you respond

September 1, 2020

A contact tracer from your state health department might call if you’ve been exposed to COVID-19. But scammers are pretending to be contact tracers, too. Here’s how you can spot the scam. View the infographic from the FTC

Adware

September 1, 2020

Adware is unwanted software designed to throw advertisements up on your screen, most often within a web browser. Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.