|
|
posted by: IT Security Team at Tuesday, February 23, 2021 5:23:00 AM
Qshing, or QR Code Abuse, is a growing cybersecurity threat. Those square codes that have become popular over the past few years can also hide links to malicious sites and websites that generate them can steer you to a malicious site...
|
posted by: IT Security Team at Wednesday, January 27, 2021 8:05:00 AM
Apple has released iOS/iPadOS 14.4 with security fixes for three vulnerabilities, said to be under active attack by hackers.
The technology giant said in its security update pages for iOS and iPadOS 14.4 that the three bugs affecting iPhones and iPads “may have been actively exploited.” Details of the vulnerabilities are scarce, and an Apple spokesperson declined to comment beyond what’s in the advisory.
Please update your Apple devices as soon as possible. For details, please check out the full blog post...
|
posted by: IT Security Team at Monday, January 25, 2021 8:01:00 AM
Business email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional. View this blog post to learn about BEC and see tips on how to prevent it...
|
posted by: IT Security Team at Monday, August 10, 2020 9:54:00 AM
These 10 cybersecurity tips will help you maintain your personal cybersecurity...
|
posted by: IT Security Team at Thursday, June 4, 2020 10:39:00 AM
With the influx of remote workers, it’s a perfect opportunity to flood people’s inboxes with malicious emails and fake links. The Cofense Phishing Defense Center (PDC) recently uncovered a phishing campaign that targets employees to harvest their Microsoft credentials. Ironically, the phish was found in an environment protected by Microsoft’s own secure email gateway (SEG). The phishing email, which was reported to the PDC using the Cofense Reporter button, included a well thought out “AudioChat” notification link supposedly from Microsoft Teams.
Teams is one of the most popular platforms for remote employees. Predictably, the threat actors have taken this into consideration – especially during the COVID-19 pandemic with millions of people teleworking. We expect this trend to continue with similar communication platforms.
|
posted by: IT Security Team at Monday, May 4, 2020 3:15:00 PM
When using Android devices, be sure to use the Google Play Store to download apps. While third party app stores are available, they have are more likely to include malicious apps. In this case, COVID-19 themed apps have been showing up in various third party app stores that pose a threat to the user that installs them. As always be careful as to what apps you download and avoid third party app stores.
|
posted by: IT Security Team at Saturday, March 14, 2020 2:00:00 PM
In the interest of helping to keep you safe not only at work but at home, SOPHOS has made available multiple free products that are available for personal use that you may find useful. This is even more vital if you are working remotely from a personal computer.
|
posted by: IT Security Team at Friday, February 28, 2020 2:50:00 PM
Here's an update of a post from 2016. It still holds true today...
USB "Thumb" Drives are popular tools for backing up and transporting data. They are small and feather-light, yet can hold mountains of data. Their compact design enables us to conveniently slip them into our pockets when on the go and then used in almost any device that's handy. However, it is precisely this efficient usefulness that also makes them dangerous. Consider the following inside this post...
|
posted by: IT Security Team at Friday, January 10, 2020 12:33:00 PM
In recent months we've seen an increase in email that has the name of a staff member, usually a supervisor or director, on it but is from an unknown email address. Anyone can put any name they like on an email account, so it's very hard to prevent this. However they tend to send phishing email like this in an attempt to steal money. Please see the blog post for further details and an amazing example.
|
posted by: IT Security Team at Wednesday, January 8, 2020 10:57:00 AM
Smishing is phishing via Short Message Service (SMS Texting) on a participating device, usually a cell phone. Long neglected by phishers and spammers, smishing has recently become a very common way of spamming, phishing, and spear phishing potential victims. KnowBe4 has been covering and warning users about it and its coming rise for years. This blog post will cover why smishing is becoming so popular, show some general and more sophisticated examples, and discuss defenses.
|
posted by: IT Security Team at Tuesday, December 31, 2019 7:54:00 AM
The City has seen an influx of phishing emails lately that claim to be sending you a Voicemail Message. Check out this post for further details.
|
posted by: IT Security Team at Monday, November 4, 2019 4:25:00 PM
According to the Alabama Association of Chiefs of Police, below are 15 potentially dangerous apps every parent should look for on their child's cell phone and/or tablet. Please see this article inside...
|
posted by: IT Security Team at Tuesday, October 15, 2019 8:13:00 AM
Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, like your contacts, photos, videos, location and health and financial data. It's important to use your mobile devices safely. The first step is to STOP. THINK. CONNECT. STOP: make sure security measures are in place. THINK: about the consequences of your actions and behaviors online. CONNECT: and enjoy your devices with more peace of mind.
|
posted by: IT Security Team at Friday, October 4, 2019 5:20:00 AM

Every October is National Cybersecurity Awareness Month. We will be releasing further information as the month unfolds. Click on the link inside to get involved.
|
posted by: IT Security Team at Wednesday, October 2, 2019 11:41:00 AM
VPNs ('Virtual Private Networks') are a good idea to use on your mobile devices to protect your privacy when connected to a public or other ...
|
posted by: IT Security Team at Friday, September 20, 2019 7:20:00 AM
How anonymous are you while online? Check out this page from CISA on what is generally collected by websites and tips on how to limit your exposure.
|
posted by: IT Security Team at Monday, July 29, 2019 6:45:00 AM
Have you ever experienced odd happenings on your computer, gotten weird messages, had friends get strange messages supposedly from you, etc? Then there is a ...
|
posted by: IT Security Team at Monday, July 15, 2019 9:27:00 AM
As we all know, robocalls and vishing (voice phishing over the phone) have become an increasing annoyance in our everyday lives. Whether the calls are ...
|
posted by: IT Security Team at Tuesday, June 25, 2019 5:44:00 AM
Over the past few years, gadgets have become increasingly common in our homes to make them 'smart'. The devices range from voice assistants (such as ...
|
posted by: IT Security Team at Wednesday, May 8, 2019 10:12:00 AM
If you use Apple products, please see this important article on how to avoid phishing scams related to your Apple ID.
|
posted by: Scott Fairholm at Tuesday, March 5, 2019 8:59:00 AM
While we have written about the various ways to identify phishing emails, we want to alert you to a specific type of phishing that we have noticed has been on the rise lately, Credential Phishing.
|
posted by: Scott Fairholm at Monday, March 4, 2019 2:04:00 PM
Here’s why that’s a bad idea.
|
posted by: Scott Fairholm at Tuesday, February 19, 2019 11:22:00 AM
As we are upon another tax season, scams involving tax filing always increase in intensity.
|
posted by: Scott Fairholm at Friday, January 25, 2019 9:24:00 AM
We all get emails that we don’t want, and sometimes stopping them up can be as easy as clicking “Unsubscribe” at the end of the email.
|
posted by: Scott Fairholm at Friday, November 16, 2018 9:00:00 AM
Phishers take advantage of the increase in year-end online shopping during the most popular shopping holidays of the year—Black Friday, Cyber Monday, and the days leading up to Christmas.
|
posted by: Scott Fairholm at Monday, October 29, 2018 7:37:00 AM
Defenseless devices are an invitation to hackers.
|
posted by: Scott Fairholm at Thursday, September 27, 2018 1:32:00 PM
We have recently seen an uptick in emails that contain foreign languages, especially German and Chinese. Be extremely careful with them.
|
posted by: Scott Fairholm at Monday, September 24, 2018 1:11:00 PM
If you’ve heard about security breaches in the news and wondered what you can do to protect yourself and your identity, help is here, and it’s free.
|
posted by: Scott Fairholm at Monday, July 23, 2018 1:27:00 PM
Phishing via email is a significant problem and is where over 90% of malicious attacks begin. Payroll phishing is a type that is increasing. Find ...
|
posted by: Scott Fairholm at Friday, June 22, 2018 1:57:00 PM
Phishing emails try to trick you into clicking on a malicious link, opening an infected attachment, or providing personal information. Don't be fooled! Check out ...
|
posted by: Scott Fairholm at Wednesday, June 6, 2018 1:17:00 PM
There is malware called VPNFilter going around the Internet that is designed to infect various models of home and small-business type routers. Reboot to protect your device.
|
posted by: Scott Fairholm at Thursday, May 3, 2018 4:20:00 PM
Today is the day to #LayerUp by making sure you have strong passwords protecting your information.
|
posted by: Chuck Williams at Friday, September 8, 2017 6:15:00 PM
Equifax, one of three U.S. credit reporting agencies, recently experienced a security breach that affects 143 million Americans.
|
posted by: Chuck Williams at Friday, August 4, 2017 8:00:00 AM
Did you know that people are 6X more likely to open a phishing email than a genuine marketing email? Don't take the bait! i
|
posted by: Chuck Williams at Monday, June 26, 2017 1:17:00 PM
Read these eight tips to help you avoid getting tricked into clicking a link in a malicious email with phishy content.
|
posted by: Chuck Williams at Friday, May 12, 2017 1:51:00 PM
A significant ransomware attack is currently underway around the world. City of Chesapeake systems are currently protected, however we highly recommend that you make sure ...
|
posted by: Chuck Williams at Thursday, May 4, 2017 1:30:00 PM
Today is the day to #LayerUp by making sure you have strong passwords protecting your information. Here’s how: Never give your password to anyone. If ...
|
posted by: Lizz Gunnufsen at Thursday, March 30, 2017 7:59:00 AM
A hacker group is threatening to reset iCloud passwords and wipe Apple devices on April 7. Find out what you need to know to protect yourself.
|
posted by: Peter Wallace at Tuesday, March 28, 2017 11:26:00 AM
Mobile apps have become part of our daily lives. Find out how to keep them - and your personal information - secure.
|
posted by: Peter Wallace at Thursday, March 23, 2017 10:57:00 AM
Keep your devices safe and secure while you're on the road.
|
posted by: Peter Wallace at Monday, December 12, 2016 10:08:00 AM
Here’s why that’s a bad idea.
|
posted by: Peter Wallace at Wednesday, December 7, 2016 8:37:00 AM
The holiday season is in full swing, which may also mean changes to your spending habits. Perhaps you’re shopping at different online stores or visiting new places. Here are some tips for protecting your financial transactions from hackers.
|
posted by: Peter Wallace at Monday, September 19, 2016 10:50:00 AM
USB "Thumb" Drives are popular tools for backing up and transporting
data. They are small and feather-light, yet can hold mountains of data.
Their compact design enables us to conveniently slip them into our
pockets when on the go and then used in almost any device that's handy.
However, it is precisely this efficient usefulness that also makes them
dangerous. Consider the following...
|
posted by: Peter Wallace at Wednesday, August 10, 2016 8:19:00 AM
Can you detect a real email from a fake one? Most of us think we can, but hackers are getting more and more sophisticated with their email phishing scams. Take this quick Phishing IQ Test to see how well you score on spotting fraud.
|
posted by: Peter Wallace at Friday, July 1, 2016 8:25:00 AM
Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. It's a thriving new virus that offers hackers a simple, reliable revenue stream. Classic malware sits and waits in the dark corners of your system, hoping that you'll eventually type in personal details like a credit card number they can steal. However, ransomware isn't shy. Once it's on your system, it encrypts your files and holds your data hostage and loudly demands that you pay your attacker directly. The demand often looks something like this:
|