In 1982, Time Magazine named the
“Personal Computer” as their titular Person of the Year (or rather, their
Machine of the Year) to herald the dawn of the Digital Revolution. At the time,
the demand of computers for commercial use was still only in its genesis years:
in 1980, a mere 724,000 devi ...
As the frequency and complexity of online threats
and phishing emails climbs, the importance of cybersecurity training is
paramount. Training empowers employees to identify and handle potential cyber
threats, thus adding a valuable layer of security to an organization and, in
turn, fostering a cybe ...
Phishing
attacks are an evolving threat in today’s world. As technology advances, so do
cybercriminals. Attackers have adopted a strategy of sending emails wherein
they impersonate a trusted source through their email address or their
signature. Their intent is to have their target unknowingly re ...
Microsoft has been
rolling out a new Microsoft Authenticator feature which has added another layer
of protection to your 2FA process. Users will now notice that Microsoft
Authenticator is requiring number matching during the authentication process.With the constant
evolution of cybersecurity threat ...
This October will mark the 20th annual
Cybersecurity Awareness Month. The Cybersecurity Infrastructure Security Agency
(CISA) and the National Cybersecurity Alliance (NCA) have partnered to declare
the October 2023 theme “It’s Easy to Stay Safe Online” and encourages “4 Simple
Steps Every A ...
With
working from home and hybrid work models, the use of personal devices for work
purposes has become increasingly common. While this trend is very convenient
for both employers and employees, it also poses a significant risk to both. Let’s
dive into the risks of using personal devices for work ...
Your
phone vibrates, and you check the message: it appears to be from your bank,
urging you to take immediate action - but could this be a smishing attack in
disguise? As we increasingly rely on our smartphones for everyday communication
and transactions, smishing is just one of the many threats to ...
On Wednesday, January 25th Alicia will be doing a CLE webinar for the ACBA. She will be speaking on, "What You Need to Know to Be More Proactive About Cyber Security". Alicia’s seminar will review what you need to know to be more cyber secure and technology competent to help prevent a cybercrimin ...
When
it comes to cybersecurity, criminals will try anything to get access to your
data. Threats ranging from dumpster diving for decommissioned computers to
theft and misplaced devices can allow private information to fall into the
hands of cyber criminals. While things such as screen locks, physic ...
From
your online banking accounts to your social media accounts and everything in
between, you must protect your online accounts with strong and unique
passwords. With the average user having dozens of online accounts, it becomes a
nearly impossible task to remember a long and complex password for ...