ou know that little pop-up prompting you to restart your computer for a software update? The one that only seems to come up when you’re in the middle of something important? As annoying as it may seem,
ou know that little pop-up prompting you to restart your computer for a software update? The one that only seems to come up when you’re in the middle of something important? As annoying as it may seem,
It’s important to protect your information from cyberattacks no matter where you are, especially when working at the airport or a local cafe. If you don’t follow your organization’s cybersecurity practices while working in a public location,
Every year, the bad guys take advantage of innocent taxpayers, like you, who are patiently waiting on their tax return. Last year, the IRS noticed a significant increase in phishing attempts to steal money or tax data,
You probably use URLs every day to access important websites such as your email inboxes, online banking accounts, and social media profiles. Unfortunately, cybercriminals can use URLs to direct you to malicious websites, to steal your personal
Personal pictures, social networking, online banking are all services that you should not do, or be logged in to on your work computer. Work computers are for work, visiting work-related websites, researching, emailing, generating Powerpoint slideshows, and
More than half of the world’s population uses at least one social media platform. Users can post to Facebook, Instagram, and Snapchat for all their followers to see. When a friend, family member, or influencer posts to
Cybercriminals send more phishing emails now than ever before. When you receive an email, it’s important to look for any red flags. One red flag you can look for is a suspicious sender. If the sender is
Locking your screen when you leave your desk is a simple way to keep your information secure and is often overlooked. Keeping your screen unlocked can be dangerous for a number of reasons. Many computers are set
If you’ve taken security awareness training, you have probably been taught to hover your cursor over a link to view the destination URL. Checking the URL for things like misspellings, unofficial domain names, and sneaky subdomains is
New innovations in technology are being developed at a rapid rate. But new technology comes with new risks. Let's go over some examples of how technology will change in the future and ways you can stay safe.