Why You Need Mobile Protection

security3By now, you are probably used to protecting your computer from a wide variety of threats, but what about your phone? Most of us rely on our mobile phones to communicate, socialize, work, store pictures and contacts, and even do online tasks like banking and shopping, yet we don’t often protect them.

This could be a mistake. Mobile security threats—both offline and online—are prevalent and growing.…
Continue reading -->

Top Tips to Protect Your Email

red-emailE-mail and instant messaging (IM) are terrific forms of communication for keeping in touch with family, friends, and business associates. However, using them unwisely may make you and your computer susceptible to spam, phishing scams, viruses, and other online threats.

Here are some tips to avoid these problems:


  1. Obtain comprehensive security software. Be sure that the security software you select  protects you and your PC from viruses, worms, Trojans, unwanted e-mail (spam), phishing scams, and other malicious software.

Continue reading -->

Top Tips to Avoid Bad Apps

desktop-with-devicesMobile apps can be fun, especially since many are free, but did you know that their popularity has made them a growing target for malware? Cybercriminals have been busy distributing malicious apps designed to steal the information stored on your smartphone, or even send out expensive texts without your knowledge.

Often they try to hook you with free apps masquerading as games or other useful applications, such as calculators.…
Continue reading -->

Tips to Protect against Losing Personal Data Off Your PC

cyberlaw6Everyday computers are lost, stolen, hacked or shared without permission. As a result, your personal and confidential information can become available to anyone and may lead to privacy invasion, identity theft, financial loss and a huge amount of stress as well as a waste of a lot of time spent cleaning up the mess.

Personal computers are a treasure chest of information.…
Continue reading -->

Small Businesses Are Just As Vulnerable to Online Attacks

securityData loss prevention and hacker attack defense shouldn’t be just concerns of large corporations. Small businesses should be equally as worried because their computers can be just as vulnerable to attack, theft, and loss – perhaps, even more so. The information lifted off of small business laptops can also be just as useful to hackers and other cybercriminals, as the data grabbed off a big company’s computer.…
Continue reading -->

6 Ways To Protect Yourself Online


  1.  Create smart and strong passwords. Make it difficult for hackers to crack your password. You can create a smart password by incorporating capital letters, numbers, and special characters, and using more than six characters. An example of a strong password is: Go1dM!n3.
  2. Use email wisely. Email is a great way to keep in touch with friends and family, and as a tool to conduct business.

Continue reading -->

10 Ways to Defend Against Phishing


  1.     Keep your operating system patched to avoid known software vulnerabilities from being exploited. Install patches from software manufacturers as soon as they are distributed, since hackers can quickly assemble malware using pre-made components to exploit the vulnerability before the majority of people download the fix. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.

Continue reading -->

One Phish, Two Phish, Old Phish, New Phish

cybercriminalPhishing (fish’ing) n. A method of fraudulently obtaining personal information by sending spoofed emails that look like they come from trusted sources.

Pharming (färm’ing) n. A method of redirecting Internet traffic to a fake web site through domain spoofing.

Whether you’re a casual web surfer or immersed in a cyber lifestyle, all Internet users are under assault by phishing emails, pharming sites, and crimeware.…
Continue reading -->

Look Out for Voice Phishing, a.k.a. Vishing

it-did-whatAs a natural evolution of phishing—the method of tricking consumers into giving up their personal financial information using fake emails and web sites that look exactly like they are from real companies—Internet scammers are now switching to voice phishing or “vishing.”

Vishing combines the use of phones with clever social engineering to gain access to a victim’s personal and financial details.…
Continue reading -->

How to Protect Your Computer Against Virus and Worm Attacks

human-data-cyber-robot-cyborgAs the Internet becomes more and more integrated into our everyday lives, we must all learn how to defend against new types of online attacks. While viruses remain a threat, today’s hackers commonly use vicious multi-layered attacks, such as a worm in a chat message that displays a link to a web page infected with a Trojan horse. “Worms” have been found that tunnel though programs, uncovering new vulnerabilities and reporting them back to hackers.…
Continue reading -->