Category Cybersecurity

Types of Cyber Attacks


What is Malware or Malicious Software?

It is any software that harms or misuses your electronic devices that connect to the Internet, the purpose is to delete files, monitor activity, or as simple as slowing down your system.




Tips To Protect Data

Threats to your data have increased due to Covid-19 and unconventional tactics. We’ve put together tips to help protect your data.

1 Multi-Factor Authentication (aka Two-Form Authentication)
Multi-factor authentication is based on providing multiple authentication methods, such as something you are, something you know and something you have. By having a multi-check process, you are reducing your risk of being phished.
2 Password Manager
Password managers store your login information for all the websites you use and help you log into them automatically. They encrypt your password database with a master password – the master password is the only one you have to remember.
3 Patching Devices
Applying patches to your devices is very important. Vendors (Apple, Microsoft, Google) fix vulnerabilities in their software updates/patches. If you do not patch/update your device, malware can sneak in and infect your device.
4 Encrypt Your Data
In case your laptop or mobile device is lost or stolen, encrypting your hard drive and email provides an additional layer of protection against thieves.
5 Confirm Email Sender
Hackers can spoof the display name of a person you know or trust in email. Be sure to look at the email address to confirm the true sender. Any email discussing personal or sensitive data needs a phone call to the sender to verify.
6 Limit Personal Information
Social media is great to connect with long-lost friends, family and potential clients. However, hackers look for common items people share – pet names, maiden names, your favorite places – to hack in. Minimize how much information you share on your platforms.
7 Turn Off Bluetooth
Bluetooth is easy for hackers to communicate with your phone and steal data from the phone if Bluetooth is enabled. Disable Bluetooth when you are not using it.
8 Links To Phishing Scams
Fake e-mails are sent that appear to be coming from your bank, asking you to verify your bank account has not been tampered with. Delete the email and do not click the link provided.