Resources

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

IT Security Tip #40:

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but let’s suppose you suddenly realize your machine or device has been compromised and you’re staring at a ransom note. Now what?

read more
Cyber Security Tip: Is this request really from the boss

Cyber Security Tip: Is this request really from the boss

IT Security Tip #39:

Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to send them a copy of employee pay stubs, tax information or other files with confidential data such as social security numbers in them, or they’re asking you to transfer or ACH payment to a vendor or a different bank account.

read more
Cyber Security Tip: Don’t just throw out old computers or devices

Cyber Security Tip: Don’t just throw out old computers or devices

IT Security Tip #38:

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information in the form of saved passwords, Internet history and files left on the retired computer or server.

read more
Cyber Security Tip: Are you SURE you want to send that e-mail?

Cyber Security Tip: Are you SURE you want to send that e-mail?

IT Security Tip #34:

Never forget that e-mail constitutes a legal record and can be admissible in legal actions, not only in the courtroom, but in the court of public opinion. People sue for all kinds of silly reasons. Family members get into disputes, couples get divorced, consumers sue merchants, and vendors can pursue delinquent clients.

read more