You probably use your favorite search engine, such as Google or Bing, to find more information about topics that interest you. Have you ever stopped to think about how the top search results earned their spots? Unfortunately,
You probably use your favorite search engine, such as Google or Bing, to find more information about topics that interest you. Have you ever stopped to think about how the top search results earned their spots? Unfortunately,
Elon Musk, the CEO of Tesla, recently purchased the social media platform Twitter. Since this purchase, Twitter started allowing users to pay for a monthly subscription called “Twitter Blue.” Twitter Blue displays a blue verification checkmark next
What is BEC? In a Business Email Compromise (BEC) attack, cybercriminals impersonate business professionals to trick victims into sharing information about their organization. This attack is an advanced form of spear-phishing: a phishing attack that targets a
The U.S. Government recently announced its plan to give citizens up to $20,000 of student loan relief. This plan requires that citizens submit an application to determine if they qualify for the loan. Cybercriminals are taking advantage
Did you know that the average person uses the same three to seven passwords to log in to over 170 online accounts? In addition to being reused, these passwords are often weak and can be easily guessed
Data breaches are becoming more and more common these days. You hear about them in the news all the time. So you might be wondering: what exactly is a data breach? A data breach is when secure
If you’re not a cybersecurity expert, you may wonder, “What is a SIEM anyway?” SIEM is an acronym for Security Information and Event Management. But what does that mean exactly? The first and most basic function of
Most universities provide students with email addresses from the university’s official domain. For example, a student's email address could be firstname[at]harvard[dot]edu. Since these email addresses use real university domains, cybercriminals try to gain access to student email
Do you regularly use your debit card for online purchases? Do you have payment information saved on online shopping accounts? Do you use autofill to enter your payment information? If you answered yes to any of these
Did You Know? CityCare by Citynet offers worry-free network management, including software management on covered devices. Learn more! We close this year’s Cybersecurity Awareness program with a look at the danger presented by phishing. What is Phishing?