Education

Protect your online activities and privacy with something called a VPN (Virtual Private Network). A VPN is a technology that creates a private, encrypted tunnel for your online activity making it...

Your are entitled to a free credit report every 12 months from each of the three major consumer credit reporting companies: Equifax, Experian, and TransUnion.

Request your credit reports...

You may have heard the term “Dark Web” used by others or in the media and wondered “what is the Dark Web?” or “should I be doing anything about it?”. Today we explain what the Dark...

Cybersecurity is something we read about in the news almost every day as organizations and governments around the world continue to get hacked. There is a huge demand for people...

You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three...

It's never too early to start teaching children about financial responsibility! ...

Mobile devices, such as smartphones, smart watches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as frequently as...

Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity—personalized scams. Cyber criminals find or purchase information about...

You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to...

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use...

Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you...

Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common...

Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should...

What are Smart Home Devices?

Traditionally only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However today, more and more...

When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals do...

You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber...

Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in...

Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all...

Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since your devices are such an...

Several years ago, creating a cybersecure home was simple; most homes consisted of nothing more than a wireless network and several computers. Today, technology has become far more complex and is...

The holiday season is nearing for many of us, and soon millions of people around the world will be looking to buy the perfect gifts. Many of us will choose to shop online in search of great deals...

Many of us feel comfortable with technology, to include how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused,...

Data breaches pose a potential risk to consumers in the form of identity theft, account takeover and fraud when personal and sensitive information is compromised.

A password manager is a simple solution for storing your passwords.

If you use a computer or mobile device long enough, sooner or later something will go wrong, resulting in lost data.

Online gaming is a great way to have fun; however, it also comes with its own set of unique risks.

The "WannaCry" cyber attack infected 200,000+ computers and locked organizations out of their data.

The number of ways children today can go online and interact with others is staggering.

Strong passwords are essential to protecting your accounts and your online identity.

Apps on mobile devices have become one of the primary technologies we use.

Do you connect to the Internet and use your devices on the road?

Cyber security is at the forefront of the news today. Keeping up-to-date on how to protect yourself when using electronic devices is one of the best ways you can mitigate potential security issues...

Beware of phone calls where the caller requests personal information like your birthdate, social security number, or other information. It's important to safeguard your personal...

Elder abuse may take many forms. North Dakota defines elder abuse as any willful act or omission of a caregiver or any other person which results in physical injury, mental anguish, unreasonable...

Email is still one of the primary ways we communicate.

As technology gains a more important role in our lives, it also grows in complexity.

"The Cloud"  can mean different things to different people.

“The grandparent scam” has affected many people, but that's not the only scam targeting senior citizens. Anyone can be the target of these scams, not just senior citizens.

Identity Theft is a fraud committed or attempted using the identifying information (any name or number that may be used alone or in conjunction with any other information, to identify a specific...