The password to your online account is like the key to your front door. How strong are your passwords? We’ll address some troubling facts about weak passwords and what you can do to make them stronger.
Continue Reading… Weak Passwords: Are You Making It Too Easy For Criminals?
In this age of digital communication, it’s common to receive email attachments that we open without thinking twice. But did you know that close to 1 in 25 email attachments are actually malicious? Some malicious attachments come from spam emails, which usually are easy to identify, while other emails appear harmless to the naked eye. So how do you determine if the Microsoft document or PDF file you’ve received from a job recruiter is legitimate or not?
Continue Reading… Is This File Safe Or Malicious?
Imitation is the sincerest form of flattery. But not when it involves your identity. Learn some of the many ways thieves commit identity theft, and what steps you can take to protect your good name.
Continue Reading… Identity Theft Epidemic: How Thieves Steal Your Identity Online and Offline
Your mobile device is a valuable target to thieves. You never know when one will strike: one minute you’re typing a text, and the next, your smartphone is snatched right out of your hands. We show how and where mobile theft occurs and what you can do to prevent it from happening to you.
Continue Reading… Smartphone Theft in the US
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of being exposed to many online dangers becomes very real. Here in our infographic, we address some of the online dangers kids could face, ways they can be exposed, and a few steps parents can take to keep their kids safe.
Continue Reading… Protecting Kids Online