Archives - Cybersecurity Tips


Don’t get in a stranger’s vehicle if you’re meeting them for the first time

IIt’s been good advice since you were a child, but it applies when you’re an adult, too: Avoid getting in vehicles with strangers. If you’re meeting someone online for the first time, arrange your own transportation. Online dating – once the ugly cousin of the dating world – is now hitting it off. As with […]

6 tips to keep your home security system secure

If you have a home security system, it might be vulnerable to individuals with malicious or mischievous intentions. That’s because it uses Wi-Fi — meaning someone can break into it. The footage that your cameras pick up could potentially be made public or used for nefarious purposes. This can include private video and audio which […]

Never respond to requests for money

A common scheme on social media and dating sites is to connect with someone online, trick them into thinking the relationship is legitimate, and then attempt to steal money from the victim. This can come in many forms, but often the cybercriminal will make up a story like they’re stuck in another country and can’t […]

Use unique photos for different sites.

If you’re using one photo for a social media account and another for a dating app, you run the risk of being the victim of a reverse image search, which would allow a stranger to find you on both accounts — or any others the photo exists on. It’s easy to see why you should […]

Watch out for shoulder surfing

When you are in public areas cybercriminals can simply glance over your shoulder as you type. By just watching you, they can steal sensitive or personal information. Screen protectors which prevent shoulder-surfers from seeing your device screen can be purchased for a small expense. For smaller devices, such as phones, be aware of your surroundings […]

Don’t overshare on the Internet

There is such a thing as too much information. Oversharing is more than simply irritating. When a criminal decides to target someone for an identity theft scheme, they may initiate their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]