Archives - Cybersecurity Tips


Don’t overshare on the Internet

There is such a thing as too much information. Oversharing is more than simply irritating. When a criminal decides to target someone for an identity theft scheme, they may initiate their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]

Use bookmarks so you always know where a link leads

If you’re always using a search engine or typing in a URL manually, you run the risk of clicking a bad link or mistyping the URL, which can potentially lead you to a malicious site that attempts to copy the look of the page you were intending to go to. To protect yourself, use bookmarks, […]

Securing your home network: Simple steps you can take to protect your family online

Hackers grab the headlines constantly these days — usually for corporate ransoms and massive data leaks — but beneath these high-profile cases, other cybercriminals are targeting people like you: users on a home network. They can steal your information, log-in details and web history, knowing your network is much easier to breach than any company […]

Delete apps and programs you no longer use from your phone, tablet, and computer

Apps and programs often require special permissions to function, such as being able to access your camera or personal data. There’s no reason to have unused apps with special permissions from a security standpoint, so it’s best to delete any apps or programs you no longer use, just to be safe. Besides, many of these […]

Don’t write down your login information on Post-It Notes

This might seem obvious, but you may be surprised at how many people stick their login credentials to their monitors at work. This can potentially give access to anyone if you so much as step away from your workstation for a few minutes. If the bad actor doesn’t sit down at your desk directly, they […]

Be careful of the permissions you give to apps

Be wary of app permissions that don’t seem appropriate. If an app wants access to the information in your email accounts, for example, it may be trying to steal personal data. It can be tricky to know for sure if an app permission request is legitimate or not, so err on the side of caution […]