Education

Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you...

Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common...

Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should...

What are Smart Home Devices?

Traditionally only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However today, more and more...

When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals do...

You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber...

Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in...

With so many options out there for checking your credit score how can you be sure you are getting the right one?...

Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all...

Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since your devices are such an...

Several years ago, creating a cybersecure home was simple; most homes consisted of nothing more than a wireless network and several computers. Today, technology has become far more complex and is...

The process of authentication, or proving who you are, is key to protecting your information, such as your email, social media, or online banking accounts. You may notrealize it, but there are...

The holiday season is nearing for many of us, and soon millions of people around the world will be looking to buy the perfect gifts. Many of us will choose to shop online in search of great deals...

Many of us feel comfortable with technology, to include how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused,...

Data breaches pose a potential risk to consumers in the form of identity theft, account takeover and fraud when personal and sensitive information is compromised.

A password manager is a simple solution for storing your passwords.

If you use a computer or mobile device long enough, sooner or later something will go wrong, resulting in lost data.

Online gaming is a great way to have fun; however, it also comes with its own set of unique risks.

The "WannaCry" cyber attack infected 200,000+ computers and locked organizations out of their data.

The number of ways children today can go online and interact with others is staggering.

Strong passwords are essential to protecting your accounts and your online identity.

Apps on mobile devices have become one of the primary technologies we use.

Do you connect to the Internet and use your devices on the road?

Cyber security is at the forefront of the news today. Keeping up-to-date on how to protect yourself when using electronic devices is one of the best ways you can mitigate potential security issues...

Beware of phone calls where the caller requests personal information like your birthdate, social security number, or other information. It's important to safeguard your personal...

Elder abuse may take many forms. North Dakota defines elder abuse as any willful act or omission of a caregiver or any other person which results in physical injury, mental anguish, unreasonable...

Some people replace their mobile devices as often as every year.

Email is still one of the primary ways we communicate.

As technology gains a more important role in our lives, it also grows in complexity.

"The Cloud"  can mean different things to different people.

“The grandparent scam” has affected many people, but that's not the only scam targeting senior citizens. Anyone can be the target of these scams, not just senior citizens.

The FDIC released a special edition of their quarterly FDIC Consumer News (Winter 2016) focusing on Cybersecurity.

Identity Theft is a fraud committed or attempted using the identifying information (any name or number that may be used alone or in conjunction with any other information, to identify a specific...