Education

Ransomware is a type of malicious software (malware) that is designed to hold your files or computer hostage, demanding payment for you to regain access. Ransomware has become very common because...

In the past, building a home network was nothing more than installing a wireless router and several computers. Today, as so many of us are working, connecting, or learning from home, we have to...

You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run your laptop, could...

Most of us are so looking forward to spring! The landscape starts to take shape, flowers start to bloom, and, for many, there’s a desire to spring clean. While it might be easy to see the need to...

"Social Security scams are the most commonly reported type of fraud and scam...these scams...

Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of their private life—from their health issues to their family and friends’...

Have you ever thought about the uncomfortable question, What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of...

At Cornerstone Bank we want to be who you turn to when making important decisions about your money. We believe that knowledge is power, especially when it comes to...

One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick you with phone calls. However, as technology...

The holiday season is nearing for many of us and soon millions of people will be looking to buy the perfect gifts. Many of us will shop online in search of great deals and to avoid noisy crowds....

Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that...

Attempts to scam or fool you can happen over almost any form of communication you use—from Skype, WhatsApp, and Slack to Twitter, Facebook, Snapchat, Instagram, and even gaming apps. Communication...

If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware...

Protect your online activities and privacy with something called a VPN (Virtual Private Network). A VPN is a technology that creates a private, encrypted tunnel for your online activity making it...

Your are entitled to a free credit report every 12 months from each of the three major consumer credit reporting companies: Equifax, Experian, and TransUnion.

Request your credit reports...

You may have heard the term “Dark Web” used by others or in the media and wondered “what is the Dark Web?” or “should I be doing anything about it?”. Today we explain what the Dark...

Cybersecurity is something we read about in the news almost every day as organizations and governments around the world continue to get hacked. There is a huge demand for people...

You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three...

It's never too early to start teaching children about financial responsibility! ...

Mobile devices, such as smartphones, smart watches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as frequently as...

Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity—personalized scams. Cyber criminals find or purchase information about...

You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to...

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use...

Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you...

Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common...

Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should...

What are Smart Home Devices?

Traditionally only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However today, more and more...

When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals do...

You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber...

Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in...

Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all...

Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since your devices are such an...

Elder abuse may take many forms. North Dakota defines elder abuse as any willful act or omission of a caregiver or any other person which results in physical injury, mental anguish, unreasonable...

“The grandparent scam” has affected many people, but that's not the only scam targeting senior citizens. Anyone can be the target of these scams, not just senior citizens.

Identity Theft is a fraud committed or attempted using the identifying information (any name or number that may be used alone or in conjunction with any other information, to identify a specific...