-
How to report phishing (email, texts, calls, websites)
If you receive a phishing message, it’s important not to follow any links, download attachments, or otherwise interact with it. Clicking a link could send you to a malicious website designed to stea...
-
What is a text mail subscriber and how does it work?
The term “text mail subscriber” typically refers to someone who has signed up to receive automated text messages from organizations such as local governments, schools, delivery services, banks, or...
-
Types of cyber insurance: Coverage options explained
Cyberattacks and data incidents can affect any organization, not just large companies. Cyber insurance can help cover certain costs; however, the right coverage varies by business size, industry, and ...
-
Understanding Ticketmaster scams: Your complete guide to staying safe
Ticketmaster itself is generally a safe and legitimate platform, but scammers often exploit the intense demand for popular and sold-out events. By impersonating Ticketmaster or redirecting buyers to u...
-
What is a drive-by attack and how do you prevent it?
When you open a website, your device doesn’t just display a page. It also loads scripts, media, and other components in the background. In some cases, that background activity can be abused. A drive...
-
Citibank scams explained: Warning signs, prevention tips, and recovery steps
Scammers often target Citibank customers, sometimes misusing Citibank’s name to make fake messages seem legitimate or impersonating trusted authorities to commit financial fraud. They trick recipien...
-
Bad Rabbit ransomware: What it is and how to stay safe
On October 24, 2017, a new form of ransomware named Bad Rabbit struck numerous Windows systems, first in Eastern Europe and then other locations around the world. While the Bad Rabbit threat has since...
-
What is CryptoLocker ransomware and how can you protect yourself?
CryptoLocker is the name given to a ransomware campaign that targeted Windows computers in 2013. The original operation behind it is no longer active, but the incident shows how a ransomware attack ca...
-
Comprehensive guide to network security standards and compliance
In today’s hyper-connected world, networks form the foundation of how organizations operate and share information. As connectivity expands, so does the need for consistent, reliable security practic...
-
What is a script kiddie? How they attack and why it matters
“Script kiddies” is typically a derogatory term used to describe people who use ready-made hacking tools to launch attacks, lacking the skills to create their own. In the past, that lack of skill ...