You probably use URLs every day to access important websites such as your email inboxes, online banking accounts, and social media profiles. Unfortunately, cybercriminals can use URLs to direct you…
Author: Editor

Fraudulent Funds Transfers
Organizations often use email to send their employees invoices that they need to pay. Now, cybercriminals are taking advantage of this process by using fraudulent funds transfer (FFT) scams. In…

Proper Workstation Use
Personal pictures, social networking, online banking are all services that you should not do, or be logged in to on your work computer. Work computers are for work, visiting work-related…

Real Facebook Page, Fake Facebook Support
Facebook pages are typically used by organizations and public figures to connect with their community. Anyone can make a Facebook page, even cybercriminals. Using social media, cybercriminals spoof brands and…

Don’t Invest in Social Media Hijacking
More than half of the world’s population uses at least one social media platform. Users can post to Facebook, Instagram, and Snapchat for all their followers to see. When a…

Smishing Is 50% Off!
Have you ever received text messages about special discounts or promotions for a service you use? Many legitimate organizations send promotional text messages to their customers. Unfortunately, cybercriminals are sending…

Social Engineering Red Flags #1: Sender
Cybercriminals send more phishing emails now than ever before. When you receive an email, it’s important to look for any red flags. One red flag you can look for is…

Is Your Grandma Really Selling Furniture on Social Media?
For years, cybercriminals have used social media to post fake listings for popular items such as furniture or electronics. As these scams have grown in popularity, many people have learned…

Lock Your Screen
Locking your screen when you leave your desk is a simple way to keep your information secure and is often overlooked. Keeping your screen unlocked can be dangerous for a…