Category: Cybersecurity

  • Cybersecurity Awareness Month 2023

    Welcome to the 20th Cybersecurity Awareness Month this October! According to the Cybersecurity and Infrastructure Security Agency (CISA), since 2004, the President of the United States and Congress have declared the month of October to be Cybersecurity Awareness Month. A dedicated month for the public and private sectors, and tribal communities to work together to…

  • Fundamentals for Shoring Up Phishing Defenses

    Fight the Phish image with a person looking at a phishing email on a tablet.

    According to National Cybersecurity Alliance, phishing is one of the oldest forms of cyber-attacks that continues to grow. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous cyber-attacks…

  • Be Cyber Smart

    It's Cybersecurity Awareness Month image with background that has yellow and black.

    October begins Cybersecurity Awareness Month. As we are more connected than ever before, being “cyber smart” is critical. Security breaches and cyber-attacks continue to happen with great frequency. Cyber-attacks also continue to become more sophisticated in targeting individuals, businesses, and institutions. This year’s theme for For our first post in our weekly series about Cybersecurity…

  • Tax season phishing

    people night dark laptop

    It’s tax season.  It’s also a prime phishing season (and the start of real fishing season).   A few scams are circulating, including one targeting individuals with .edu email addresses.  Specifically, the IRS notes: The suspect emails display the IRS logo and use various subject lines such as “Tax Refund Payment” or “Recalculation of your tax refund payment.” It asks people to click a…

  • Malware removal in a nutshell

    Welcome to this quick tutorial (and collection of tips) on how to remove viruses from your machine using the power of free antivirus software and google! This guide is meant to be used alongside youtube and google when attempting to remove viruses from your devices at home Downloading an antivirus software and running frequent scans.…

  • The Threat of SIM Swapping

    Collection of SIM cards

    A lot of online services and websites offer users the ability to protect their accounts using two-factor authentication through phone text. This post will go over a way that hackers have found in order to do just that. A SIM swapping is a technique used by a cyber-criminal in order to take control of accounts…

  • Cybersecurity Occupations

    A man in a red shirt looking at a screen. There is a lock symbol in a red bubble next to the man.

    Happy Cybersecurity Month! Since it is Cybersecurity Month, it would be great to highlight career paths that can be present in Cybersecurity. Cybersecurity has become very prevalent and in demand since technology has become ubiquitous in our society. Cybersecurity is important because it helps to protect everyone’s information. Cybercrime Magazine gives a list of 50…

  • Keeping Data Safe

    the words Stop Spam on a stop sign.

    Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called “12 Things to Know About Cybersecurity Now.” In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have…

  • What is Malware?

    Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.  Not all malware is destructive, though it can cause annoying behaviors such as generating an abundance of pop-up ads or cause your computer to run slowly. In…

  • Data Breaches

    Why should you care about data breaches and why are they a potential threat?  A data breach is a security incident where information is accessed without authorization. Other terms for this are data spill, unintentional information disclosure, data leak, and information leakage. Data breaches can harm businesses and consumers in many ways. As technology progresses, more information is spread throughout the digital world, making…