Stop. Look. Think.
Don’t be Fooled!

Video Game Scams
Video games are a popular pastime for people across the world. Even if you’ve never played video games, you’ve probably heard of games like Legend

Password Managers
Our lives are full of more online accounts that require login credentials than any one person could possibly remember. Since trying to remember a different

Social Media Account Spoofing
Social media platforms such as Facebook, Twitter, Instagram, and LinkedIn are wonderful tools for staying connected. Unfortunately, these platforms are also wonderful tools to manipulate

Top Five Meta Scams
Facebook, now known as Meta, has over a billion users. That’s a lot of people who check their accounts regularly! Cybercriminals take advantage of Meta’s

Pretexting
Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as

Browser Notifications
What Are Browser Notifications? Most internet browsers allow websites to offer browser notifications. The first time you visit a website that offers browser notifications, you

Keep Devices and Software Up to Date
ou know that little pop-up prompting you to restart your computer for a software update? The one that only seems to come up when you’re

Stay Safe While Working in Public Locations
It’s important to protect your information from cyberattacks no matter where you are, especially when working at the airport or a local cafe. If you

IRS and Tax Scams
Every year, the bad guys take advantage of innocent taxpayers, like you, who are patiently waiting on their tax return. Last year, the IRS noticed

Uncovering and Reviewing Links (URLs)
You probably use URLs every day to access important websites such as your email inboxes, online banking accounts, and social media profiles. Unfortunately, cybercriminals can

Proper Workstation Use
Personal pictures, social networking, online banking are all services that you should not do, or be logged in to on your work computer. Work computers

Don’t Invest in Social Media Hijacking
More than half of the world’s population uses at least one social media platform. Users can post to Facebook, Instagram, and Snapchat for all their

Social Engineering Red Flags #1: Sender
Cybercriminals send more phishing emails now than ever before. When you receive an email, it’s important to look for any red flags. One red flag

Lock Your Screen
Locking your screen when you leave your desk is a simple way to keep your information secure and is often overlooked. Keeping your screen unlocked

URLs Are Only Half the Story
If you’ve taken security awareness training, you have probably been taught to hover your cursor over a link to view the destination URL. Checking the

How to Be Prepared for Future Threats
New innovations in technology are being developed at a rapid rate. But new technology comes with new risks. Let’s go over some examples of how

Booking a Vacation Rental? “Getaway” From These Scams
Getting ready for a vacation? If you plan to use a popular vacation rental website or application (app), such as AirBnB, HomeAway, or VRBO to

The Role of Search Engine Optimization (SEO) in Cyberattacks
You probably use your favorite search engine, such as Google or Bing, to find more information about topics that interest you. Have you ever stopped

Who Is the True Target of Business Email Compromise (BEC)?
What is BEC? In a Business Email Compromise (BEC) attack, cybercriminals impersonate business professionals to trick victims into sharing information about their organization. This attack

Keeping Your Passwords Squeaky Clean
Did you know that the average person uses the same three to seven passwords to log in to over 170 online accounts? In addition to

What’s the Deal With Data Breaches? What Do They Mean for Me?
Data breaches are becoming more and more common these days. You hear about them in the news all the time. So you might be wondering:

How to Safely Shop Online
Do you regularly use your debit card for online purchases? Do you have payment information saved on online shopping accounts? Do you use autofill to

The Shock Factor: Don’t Take the Bait!
One of the most common and successful tricks cyber criminals use to trigger you into falling for their scams is fake “stressor events”. In this

Multi-factor Authentication
What is it? Multi-factor Authentication (MFA) is the process of verifying that you are who you claim to be when logging in to a device