Keyboard with credit card and lock through card

Trending Security Topics

Cybersecurity Awareness Basics

How to avoid identity theft, frauds, scams and more. Click below for more information.

Cybersecurity Basics

Identity Theft - What To Know


Read our latest Fraud Newsletter: Citizens Fraud Update, Spring 2024


Women’s History Month: Women In Tech

For Women’s History Month, here’s a look at seven women, past and present, who have irrevocably changed the course of technology. Women are sadly underrepresented in the tech sector. The National Center for Women & Information Technology reported that in the year 2015 only 25% of tech jobs were held by women. Here is a brief list of women in the tech industry who are an inspiration to us all.


NIST Releases Version 2.0 of Landmark Cybersecurity Framework

• NIST’s cybersecurity framework (CSF) now explicitly aims to help all organizations — not just those in critical infrastructure, its original target audience — to manage and reduce risks.

• NIST has updated the CSF’s core guidance and created a suite of resources to help all organizations achieve their cybersecurity goals, with added emphasis on governance as well as supply chains.

• This update is the outcome of a multiyear process of discussions and public comments aimed at making the framework more effective.


3-Step Guide to Effective Firewall Audit in 2024

In the dynamic landscape of network security, maintaining robust defenses against evolving cyber threats is paramount. The firewall, serving as the first line of defense against unauthorized access, plays a crucial role in safeguarding information systems. Regular firewall audits are essential to ensure the effectiveness and efficiency of these security barriers.

This comprehensive guide explores what a firewall audit is, highlighting its significance, methodology, the advantages of utilizing specialized firewall audit tools, and a firewall audit checklist with 7 best practices.


A Tale of the Three *ishings: Part 1 – What is Phishing?

For the past twenty years, those of us in the cybersecurity industry have focused on how to use technology to secure technology, and we are getting pretty good at it. Unfortunately, organizations have ignored the human factor and cyber attackers have taken notice. They have simply shifted their attack vector; the human is now their primary target as we have done too little to secure them. The three most common ways cyber attackers are targeting

people is what many call the three *ishings: phishing, smishing, and vishing. In this series of three blog posts, we will cover in more detail what these three methods are, how cyber attackers are changing their tactics and techniques, and what you can do about it.


Cybersecurity Expectations in 2024

The new year is here, and once again I’ve compiled a summary of predictions for cybersecurity in 2024. The following are what analysts and industry experts agree are the current cybersecurity trends and threats we must prepare for as we execute plans for the year.


Use Strong Passwords

Simple passwords, such as 12345, or common identifying information, like birthdays and pet names, are not safe for protecting important accounts holding critical information. Using an easy-to-guess password is like locking the door but leaving the key in the lock. Weak passwords can quickly be broken by computer hackers. But it’s impossible to remember a unique strong password for every account!

The good news is that creating and storing strong passwords with the help of a password manager is one of the easiest ways to protect ourselves from someone logging into our accounts and stealing sensitive information, data, money or even our identities.


Navigating the Waters of Generative AI

Few would argue that 2023 was the year AI, specifically generative AI (Gen AI) like ChatGPT, was discussed everywhere. In October, Forrester published a report about how security tools will leverage AI. The findings in that report showed that Gen AI would augment your security tools rather than, as some may think, replace your team.


4 Critical Questions About Tech Modernization

In the race to adapt and thrive in today's disruptive financial services landscape, the speed and direction of your technology modernization strategy and efforts can make all the difference.

You face a host of challenges driven by market volatility, technological disruption, and evolving consumer expectations. And there’s increased pressure to revamp and innovate the traditional banking model, which is burdened by complex legacy technology ecosystems.