Keyboard with credit card and lock through card

Trending Security Topics

Cybersecurity Awareness Basics

How to avoid identity theft, frauds, scams and more. Click below for more information.

Cybersecurity Basics

Identity Theft - What To Know

Read our latest Fraud Newsletter: Citizens Fraud Update Winter 2023


Malvertising: What Is It And How Can It Lead To A Ransomware Attack?

While there are a wide range of cyberthreats facing every business today, one of the most dangerous is malvertising. This technique seeks to use people’s everyday web browsing activities against them by injecting malware into seemingly innocent online ads. One click on an infected ad can expose businesses to a range of problems, such as data theft. Malvertising is hard to spot and can be even harder to block, and the consequences of this type of attack can be severe. Therefore, understanding what malvertising is, how it works and how it can be stopped must play an important role in any malware protection strategy.

From “Security Boulevard” Brenda Robb (2/10/2023)


Phishing Attacks What You Need To Know

Phishing (e-mail), vishing (voice), spear phishing (targeting a specific person or group) and whaling (going after a high-profile target) are all "tactics used by thieves who are 'fishing' for your personal financial or private information," Redman said. "They want account numbers, passwords, Social Security numbers and other confidential information that they can use to loot your accounts, run up bills on your credit cards or otherwise steal your identity."

From “SHRM” Lin Grensing-Pophal (2/07/2023)


Metaverse Adds New Dimensions To Web 3.0 Cybersecurity

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions.

From “Tech Republic” Karl Greenberg (2/07/2023)


Cybersecurity: Powering The Digital Transformation

Today’s hyper-connected world presents significant cybersecurity challenges. To ensure we are prepared for future threats, we must develop a robust framework that tackles these challenges head-on and provides the flexibility and agility to address the ever-evolving threat landscape. This is especially critical given the extent to which technology has become integrated into our daily lives and the dependence of all industries and sectors on digital infrastructure for their operations.

From “Jack Henry Fintalk” Yonesy Núñez (1/18/2023)


Creating A Security-Aware Culture Isn’t Necessary For SMBs

Employees pose the biggest risk to any company. Not because they are malicious but because they don’t know better. While having strong cyber defense tools in place is table stakes, your staff still needs to be properly trained on cybersecurity threats, policies and processes.

From “Forbes” Dror Liwer (2/14/2023)


Will The FTC Call Or Write You? Will They Demand Money?

Scammers trying to rip you off will often impersonate organizations or government agencies you know. Some even pretend to be from the Federal Trade Commission. But how can you know if it’s the FTC or if it’s a scammer impersonating the FTC?

From “Federal Trade Commission” Alvaro Puig (2/13/2023)


7 Things To Do After A Hacker Breaks Into Your Computer

Follow this seven-step checklist if you’re unfortunate enough to fall victim to this cybercrime.

From “Kim Komando” Kim Komando (2/08/2023)


New T-Mobile Breach Affects 37 Million Accounts

T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an investigation determined that someone abused its systems to harvest subscriber data tied to approximately 37 million current customer accounts.

From “Krebs on Security” Brian Krebs (1/19/2023)


Donating To Help After Earthquakes In Turkey And Syria?

The devastation in Turkey and Syria following massive earthquakes is inspiring people to help and donate. And it’s prompting scammers — like they do after every disaster — to take advantage of your generosity. Find out how to make sure your money helps people in need.

From “Federal Trade Commission” Gema de las Heras (2/10/2023)


Servicemembers: DFAS Is Not Calling You About Your Pay

People are reporting a new twist on a banking imposter scam targeting the military. In this latest con, imposters call servicemembers and pretend to be from or working with DFAS (for us civilians, that’s the Defense Finance and Accounting Service, a Department of Defense agency that handles getting pay to servicemembers). Here’s how the scam plays out.

From “Federal Trade Commission” Carol Kando-Pineda (2/09/2023)


While Governments Pass Privacy Laws, Companies Struggle To Change

Traditionally, we’ve seen organizations building processes to preserve specific records to comply with specific mandates. These are usually limited in scope, affecting perhaps 5% of all data/records in-house. Now, it’s about everything—all corporate data, including information held and/or controlled by employees on their personal devices. Moreover, organizations are required to capture, index, secure, and dispose of all PII based on differing state, federal, and foreign data privacy laws.

From “Help Net Security” Mirko Zorz (2/06/2023)


Do I need Security Software?

When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However, most of today’s computers and devices have numerous security features already built into them, such as automatic-updating, firewalls, disk encryption, and file protection. In addition, Microsoft provides on Windows computers security functionality called Microsoft Defender, which includes additional features such as anti-virus. In many ways today’s systems by default are much more secure. In fact, YOU are most likely now the greatest weakness. This is why cyber attackers continually target people, attempting to trick you into doing things you should not do, such as give up your passwords, click on links, or open email attachments that install malware on your computers or share your credit card information.

From “SANS OUCH! Newsletter” Nico Dekens (2/01/2023)