Cybersecurity Trends for 2021

The landscape of cyberthreats is constantly changing. We will talk with a cybersecurity expert to learn what we can expect the greatest threats to be in 2021, the effects COVID-19 will continue to have on security and what consumers need to know to protect themselves and their families from the…

Continue Reading

Coming This Holiday Season: Package Delivery Fraud

Since the pandemic began, consumers are shopping less in brick and mortar stores and buying more online. That means that our email boxes are often full of delivery notices. And, we may not always remember exactly what we ordered or from where. Scammers are taking advantage of this with a…

Continue Reading

Secrets Your Photos Reveal About You

Consumers who believe they are careful about what information they share online may be surprised to learn just how much information is revealed through their photos. In addition to the pictures many routinely post to social media, our online video meetings and Facebook live videos can reveal details useful to…

Continue Reading

What Happens If I Lose My 2FA Device?

Two-factor authentication (2FA) provides an extra layer of security for your data, beyond just using a password. For example, it may involve having a code sent to your mobile device. But what happens if you lose that device? The good news is that, although it may be inconvenient, it is…

Continue Reading

Police Use Geofencing to Find Out Who Was at a Crime Scene

Geofencing is often used by marketers to target customers in a specific geographic location, for example to send coupons to potential buyers who are within a specified range of a retail store or restaurant. It has also been used by political campaigns to identify people who have attended rallies or…

Continue Reading

Cybersecurity While Working from Home

More employees than ever are working from home, and 85% of Chief Information Security Officers (CISOs) said that they had to sacrifice cybersecurity to quickly enable them to do so. Cybersecurity vendor Netwrix announced this and other findings from a June 2020 survey conducted to determine how organizations are responding…

Continue Reading

What is “Brushing” and Why is it Considered a Scam?

How can receiving merchandise you didn’t order and didn’t pay for be a scam? To most people getting free things in the mail sounds like a dream come true. While the person who receives the products may or may not be directly victimized, this practice, called “brushing”, is indeed a…

Continue Reading

TikTok and the Hidden Dangers in Popular Apps

Many people consider the TikTok app to be a fun pastime where they can watch videos of kids dancing or post their own funny videos. However, there is a scarier side to TikTok. At the end of 2019 the military banned the app from government-owned devices. And, hardly a day…

Continue Reading

Claim Your Accounts Before the Bad Guys Do

Many people believe that by not using the Internet to manage their accounts they are keeping their personal information offline and staying safe. In fact, they may simply be making it easier for criminals to masquerade as them and take over their accounts. KrebsOnSecurity has documented many examples of scammers…

Continue Reading

How Identity Thieves Target You

Identity theft is constantly evolving. We come up with ways to thwart the bad guys, and they come up with new ways to steal from us. Although there is probably no way to make yourself 100% secure against identity theft, there are several things you can do to make yourself…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now