What is BEC? In a Business Email Compromise (BEC) attack, cybercriminals impersonate business professionals to trick victims into sharing information about their organization. This attack is an advanced form of…
Category: Security Tips
Keeping Your Passwords Squeaky Clean
Did you know that the average person uses the same three to seven passwords to log in to over 170 online accounts? In addition to being reused, these passwords are…
What’s the Deal With Data Breaches? What Do They Mean for Me?
Data breaches are becoming more and more common these days. You hear about them in the news all the time. So you might be wondering: what exactly is a data…
How to Safely Shop Online
Do you regularly use your debit card for online purchases? Do you have payment information saved on online shopping accounts? Do you use autofill to enter your payment information? If…
The Shock Factor: Don’t Take the Bait!
One of the most common and successful tricks cyber criminals use to trigger you into falling for their scams is fake “stressor events”. In this context, “stressor events”, are shocking…
Multi-factor Authentication
What is it? Multi-factor Authentication (MFA) is the process of verifying that you are who you claim to be when logging in to a device or an account. If you’re…
Stay Safe from Password Spraying
Passwords have become an integral part of our daily lives. We use passwords to check our social media feeds, access our bank accounts, and log in to our work computers.…
How Secure is Your Mobile Device?
Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types…
Cracking the QR Code
What Is a QR Code? Have you ever seen a poster that had a jumbled-looking, square-shaped barcode printed on it? These unique squiggles make up a QR code. A QR…
Malvertising
Most websites you visit will feature some sort of advertising, such as ad banners on the side of the page or a video playing within the page itself. These ads…