|
|
posted by: IT Security Team at Wednesday, January 27, 2021 8:05:00 AM
Apple has released iOS/iPadOS 14.4 with security fixes for three vulnerabilities, said to be under active attack by hackers.
The technology giant said in its security update pages for iOS and iPadOS 14.4 that the three bugs affecting iPhones and iPads “may have been actively exploited.” Details of the vulnerabilities are scarce, and an Apple spokesperson declined to comment beyond what’s in the advisory.
Please update your Apple devices as soon as possible. For details, please check out the full blog post...
|
posted by: IT Security Team at Monday, January 25, 2021 8:01:00 AM
Business email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely on email to conduct business—both personal and professional. View this blog post to learn about BEC and see tips on how to prevent it...
|
posted by: IT Security Team at Wednesday, October 28, 2020 8:01:00 AM
Ever wondered what the big tech companies know about you? Well wonder no more, check out the link inside this post...
|
posted by: IT Security Team at Monday, October 26, 2020 9:34:00 AM
October is Cybersecurity Awareness Month. With many of us working from home this year, check out this free training course from our friends at KnowBe4.
|
posted by: IT Security Team at Thursday, October 22, 2020 10:03:00 AM
If you use SOPHOS Endpoint Protection on an Apple Mac, do not upgrade to MacOS Big Sur yet, which should be available shortly. The current version of SOPHOS will not run on Big Sur. An update will come up sometime this fall that will work.
|
posted by: IT Security Team at Wednesday, October 7, 2020 1:26:00 PM
If you recently upgraded your Apple iPhone or iPad, you may have noticed a small green or orange light at the top right of the display on occasion. This is a new feature to alert you to when the camera or microphone are in use. See this blog post for further details...
|
posted by: IT Security Team at Monday, August 17, 2020 2:00:00 PM
Security Awareness Newsletter. Please pull down the PDF from the blog post.
|
posted by: IT Security Team at Monday, August 17, 2020 8:10:00 AM
On the Dark Web, you can purchase cybercrime “how-to kits” that gather lists of breached names, account numbers, passwords, and even telephone support lines for the victims to call. Make no mistake. Just because you’re on the Dark Web doesn’t mean you’re anonymous though.
Ransomware attacks, data breaches, and scams — along with a steady stream of extortion and phishing emails — have taken over the internet. We hear about cybercrime so often that it can quickly turn into white noise. That's a mistake.
Here are 10 security myths you need to stop believing about your data.
|
posted by: IT Security Team at Monday, August 10, 2020 9:54:00 AM
These 10 cybersecurity tips will help you maintain your personal cybersecurity...
|
posted by: IT Security Team at Tuesday, May 19, 2020 11:21:00 AM
In today's world we are more connected than ever — not only to each other, but to our devices. For example, people now have the ability to open and close their garage doors and even start their cars directly from their phones. But what information do we put at risk when we do all of these amazing things? Securing Internet of Things (IoT) devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance...
|
posted by: IT Security Team at Thursday, May 7, 2020 4:45:00 PM
The first Thursday of each year is 'World Password Day'. It's designed to educate everyone on the proper and secure use of account passwords. See inside for helpful information.
|
posted by: IT Security Team at Monday, March 23, 2020 3:38:00 PM
With the current coronavirus (COVID-19) crisis, more of us will be working from home for a period of time. Please check out this post for further information on how best to do this securely.
|
posted by: IT Security Team at Saturday, March 14, 2020 2:00:00 PM
In the interest of helping to keep you safe not only at work but at home, SOPHOS has made available multiple free products that are available for personal use that you may find useful. This is even more vital if you are working remotely from a personal computer.
|
posted by: IT Security Team at Friday, March 13, 2020 7:09:00 AM
With the advent of the latest Coronavirus (COVID-19), keeping electronics that you regularly touch clean, is more necessary than ever. Check out this post for tips on keeping some of these devices clean.
|
posted by: IT Security Team at Thursday, November 21, 2019 10:27:00 AM
Here are some tips regarding the latest wireless ('WiFi') router offerings in case you are in the market for one.
|
posted by: IT Security Team at Tuesday, November 19, 2019 5:26:00 AM
It’s that time of year again, holiday shopping has begun! Everyone is looking for those unique gifts, hot toys, and cool electronics. Black Friday sales seldom fail to pique the interests of even the most casual shoppers. Yet even after the chaos of Black Friday lies both Small Business Saturday and Cyber Monday. While it’s clear that businesses are after your dollars during the holidays, you should be aware that cybercriminals are on the lookout, too. Click on this article for shopping tips from the folks at the Center for Internet Security.
|
posted by: IT Security Team at Monday, November 4, 2019 4:25:00 PM
According to the Alabama Association of Chiefs of Police, below are 15 potentially dangerous apps every parent should look for on their child's cell phone and/or tablet. Please see this article inside...
|
posted by: IT Security Team at Thursday, October 31, 2019 8:25:00 AM
If you own an Apple iPhone 5, iPhone 4s or one of the early iPads with cellular connectivity, your device is about to be turned into a vintage technology paperweight by the GPS rollover problem if you don't upgrade by Nov. 3, 2019.
|
posted by: IT Security Team at Monday, October 21, 2019 11:35:00 AM
If you've ever wondered how to block robocalls from telemarketers that interrupt you during all ours of the day, you have a number of effective options. These range from using features on your phone, options offered by your phone carrier, or using robocall blocker apps.
|
posted by: IT Security Team at Tuesday, October 15, 2019 8:13:00 AM
Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, like your contacts, photos, videos, location and health and financial data. It's important to use your mobile devices safely. The first step is to STOP. THINK. CONNECT. STOP: make sure security measures are in place. THINK: about the consequences of your actions and behaviors online. CONNECT: and enjoy your devices with more peace of mind.
|
posted by: IT Security Team at Friday, September 20, 2019 7:20:00 AM
How anonymous are you while online? Check out this page from CISA on what is generally collected by websites and tips on how to limit your exposure.
|
posted by: IT Security Team at Monday, July 29, 2019 6:45:00 AM
Have you ever experienced odd happenings on your computer, gotten weird messages, had friends get strange messages supposedly from you, etc? Then there is a ...
|
posted by: IT Security Team at Monday, July 15, 2019 9:27:00 AM
As we all know, robocalls and vishing (voice phishing over the phone) have become an increasing annoyance in our everyday lives. Whether the calls are ...
|
posted by: IT Security Team at Tuesday, June 25, 2019 5:44:00 AM
Over the past few years, gadgets have become increasingly common in our homes to make them 'smart'. The devices range from voice assistants (such as ...
|
posted by: IT Security Team at Wednesday, May 8, 2019 10:12:00 AM
If you use Apple products, please see this important article on how to avoid phishing scams related to your Apple ID.
|
posted by: Scott Fairholm at Friday, January 25, 2019 9:24:00 AM
We all get emails that we don’t want, and sometimes stopping them up can be as easy as clicking “Unsubscribe” at the end of the email.
|
posted by: Scott Fairholm at Friday, November 16, 2018 9:00:00 AM
Phishers take advantage of the increase in year-end online shopping during the most popular shopping holidays of the year—Black Friday, Cyber Monday, and the days leading up to Christmas.
|
posted by: Scott Fairholm at Monday, October 29, 2018 7:37:00 AM
Defenseless devices are an invitation to hackers.
|
posted by: Scott Fairholm at Thursday, September 27, 2018 1:32:00 PM
We have recently seen an uptick in emails that contain foreign languages, especially German and Chinese. Be extremely careful with them.
|
posted by: Scott Fairholm at Monday, September 24, 2018 1:11:00 PM
If you’ve heard about security breaches in the news and wondered what you can do to protect yourself and your identity, help is here, and it’s free.
|
posted by: Scott Fairholm at Monday, July 23, 2018 1:27:00 PM
Phishing via email is a significant problem and is where over 90% of malicious attacks begin. Payroll phishing is a type that is increasing. Find ...
|
posted by: Scott Fairholm at Friday, June 22, 2018 1:57:00 PM
Phishing emails try to trick you into clicking on a malicious link, opening an infected attachment, or providing personal information. Don't be fooled! Check out ...
|
posted by: Scott Fairholm at Wednesday, June 6, 2018 1:17:00 PM
There is malware called VPNFilter going around the Internet that is designed to infect various models of home and small-business type routers. Reboot to protect your device.
|
posted by: Chuck Williams at Friday, August 4, 2017 8:00:00 AM
Did you know that people are 6X more likely to open a phishing email than a genuine marketing email? Don't take the bait! i
|
posted by: Chuck Williams at Monday, June 26, 2017 1:17:00 PM
Read these eight tips to help you avoid getting tricked into clicking a link in a malicious email with phishy content.
|
posted by: Chuck Williams at Thursday, May 4, 2017 1:30:00 PM
Today is the day to #LayerUp by making sure you have strong passwords protecting your information. Here’s how: Never give your password to anyone. If ...
|
posted by: Lizz Gunnufsen at Thursday, March 30, 2017 7:59:00 AM
A hacker group is threatening to reset iCloud passwords and wipe Apple devices on April 7. Find out what you need to know to protect yourself.
|
posted by: Peter Wallace at Tuesday, March 28, 2017 11:26:00 AM
Mobile apps have become part of our daily lives. Find out how to keep them - and your personal information - secure.
|
posted by: Peter Wallace at Thursday, March 23, 2017 10:57:00 AM
Keep your devices safe and secure while you're on the road.
|
posted by: Peter Wallace at Monday, December 12, 2016 10:08:00 AM
Here’s why that’s a bad idea.
|
posted by: Peter Wallace at Wednesday, December 7, 2016 8:37:00 AM
The holiday season is in full swing, which may also mean changes to your spending habits. Perhaps you’re shopping at different online stores or visiting new places. Here are some tips for protecting your financial transactions from hackers.
|
posted by: Peter Wallace at Monday, September 19, 2016 10:50:00 AM
USB "Thumb" Drives are popular tools for backing up and transporting
data. They are small and feather-light, yet can hold mountains of data.
Their compact design enables us to conveniently slip them into our
pockets when on the go and then used in almost any device that's handy.
However, it is precisely this efficient usefulness that also makes them
dangerous. Consider the following...
|
posted by: Peter Wallace at Wednesday, August 10, 2016 8:19:00 AM
Can you detect a real email from a fake one? Most of us think we can, but hackers are getting more and more sophisticated with their email phishing scams. Take this quick Phishing IQ Test to see how well you score on spotting fraud.
|
posted by: Peter Wallace at Friday, July 1, 2016 8:25:00 AM
Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. It's a thriving new virus that offers hackers a simple, reliable revenue stream. Classic malware sits and waits in the dark corners of your system, hoping that you'll eventually type in personal details like a credit card number they can steal. However, ransomware isn't shy. Once it's on your system, it encrypts your files and holds your data hostage and loudly demands that you pay your attacker directly. The demand often looks something like this:
|
posted by: Peter Wallace at Monday, May 9, 2016 10:30:00 AM
Most of the questions we receive at the IT Help Desk are regarding passwords. Passwords may seem like a nuisance at times, but they are essential to our security. Below are some answers to common questions.
|