How to Avoid Credit Card Theft

How often do you use your credit card? How many do you have, and which companies do you rely on? If you’re like the average American, you probably have around four cards in your wallet right now. It can be convenient for collecting various perks, but it also increases the chances of one of them getting … Read more

Malvertising: How to Avoid Tempting Scams

One of the facets of surfing the Web are ads that appear on the sidebar, at the end of videos, as pop-ups in new windows and in a million other places as you go. These advertisements figure out what you might like to purchase through tracked Cookies on other websites, demographic information, geo-location and more … Read more

How to Keep Information Private During Video Calls

If you’re like the majority of Americans, you probably work from home at least some of the week. These days, you may not come into the office at all. In fact, more than 58% of the country’s workforce currently has a hybrid (trades off days in the office and at home) or fully remote (works only from home) schedule. If it’s … Read more

Hackers Target the Incarcerated More Than You Think

They say “don’t do the crime if you can’t do the time,” but what happens when cybercriminals decide to commit their own version of double jeopardy? Instead of sentencing convicts to twice the jailtime, though, hackers often target people who are incarcerated and steal their identities. In fact, a recent cyberattack on a healthcare company … Read more

Watch Your Webcam: What Hackers Are Doing With Your Camera

We’ve all seen it on TV: Cops processing a scene, while to their ignorance a laptop stays open so the perpetrator can watch their investigation; or in reverse, when government computer analysts break into the criminal’s webcam to find their suspect. Every crime show has a scene like this! What you might notice is that … Read more

What’s the Most Common Brand Faked By Phishers?

Phishing scams are rampant in today’s cyber-environment. Over 90% of data breaches start with a well-placed phishing message. Hackers will set “bait” to draw you into you installing malware or giving them your private information, without having to break in through more time-consuming and convoluted methods. Cybercriminals are only getting smarter with their manipulation, too. New terminology … Read more

5 Things Your I.T. Guy Says, Decoded

Whether we’re backed by a whole department of security experts, relying on chat support to troubleshoot a one-off issue, or contracting a team to mitigate an existing threat, we’ve all had to call upon tech support at one point or another. Too often, we’re then inundated with confusing technology jargon that’s hard to keep up … Read more

Should I Delete My Old Apps and Programs?

If you combed through your computer, you would probably find a lot of programs that you don’t even remember downloading. Thumb through your phone, you’ll see apps you haven’t touched in a very long time. It can be frustrating to take time out of your day to search out old programs and wait for them … Read more

Cyber Insurance FAQ’s

A cyber risk refers to the risk of financial harm that is done to an organization and is a result of a failure or disruption of its computer systems. It may also be a risk that a company faces from the way they handle their data or rely on technology in their everyday operations. But … Read more

Samsung Announces Data Breach: What Happened to YOUR Info?

Over Labor Day weekend, Samsung users in the U.S. received an unfortunate email from their provider: “In late July 2022, an unauthorized third party acquired information from some of Samsung’s U.S. systems. On or around August 4, 2022, we determined through our ongoing investigation that personal information of certain customers was affected. We have taken … Read more