Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more
6/30/2025
/ Best Practices ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Security ,
Employee Training ,
Employer Liability Issues ,
Mobile Apps ,
Online Platforms ,
Personal Information ,
Phishing Scams ,
Privacy Policy ,
Risk Management ,
Social Media ,
Social Media Policy
May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
5/28/2020
/ Coronavirus/COVID-19 ,
Cyber Crimes ,
Cybersecurity ,
Email ,
FBI ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
FinCEN ,
Fraud ,
Google ,
Phishing Scams ,
Risk Management ,
Scams ,
Vulnerability Assessments
As COVID-19 remains prevalent, working remotely has become the new normal. This means that many organizations will have people working from home for extended periods, many of whom may not be familiar with the organization’s...more
Cyber criminals exploit times of uncertainty by playing on a basic human emotion—fear—and the anxiety-producing nature of the new COVID-19 outbreak has given bad actors the opportunity to take advantage....more
Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more
11/11/2019
/ Browser History ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Digital Assets ,
Hackers ,
Information Security ,
Internet ,
Internet of Things ,
Network Security ,
Passwords ,
Public Wireless Networks ,
Risk Management ,
Websites ,
Wifi