Cyber security has become a big concern for our members who use the internet. Please take a look at the articles below for helpful tips and information to protect you!
Banking Securely Online
Online banking continues to present challenges to your financial security and personal privacy. Millions of people have had their checking accounts compromised, mainly as a result of online banking. If you are going to use online banking to conduct financial transactions, make yourself aware of the risks and take precautions to minimize them.
Some of the more popular attacks that target online banking include phishing attacks, malware, and pharming. This paper describes all of these types of attacks and describes strategies you can use to ensure that your online banking experience is as safe as possible.
Ten Ways To Improve The Security Of A New Computer
Because our computers have such critical roles in our lives and we trust them with so much personal information, it’s important to improve their security so we can continue to rely on them and keep our information safe. This informational paper outlines ten important things home and small business users can do to make their new computers more secure.
Cyber Threats to Mobile Phones
Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security.
Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers. Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
Consequences of an attack can be severe, so it is important to take steps to protect your mobile phone from attack. This paper provides advice for choosing a mobile phone with effective security features and using the phone in ways that will protect the security of your information. This paper also provides advice on what to do it your mobile phone is stolen.
A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other portable media; now viruses are primarily spread through email messages.
This document contains frequently asked questions about viruses and ways to avoid them and lessen their impact.
Recognizing and Avoiding E-Mail Scams
Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information.
This paper advises how to protect yourself from these scams by understanding what they are, what they look like, how they work, and what you can do to avoid them.
Recovering from a Trojan Horse or Virus
Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do? This paper includes steps that may help save your computer and files.
Password Security, Protection & Management
With the many ways we use the internet, it’s easy to consider some passwords less important than others. However, all passwords are important because wrongdoers can piece together the information you store online and use it for their benefit. They can even use information you share on social media networks. And commercial websites give customers the ability to store billing and shipping addresses along with credit card information.
This paper offers recommendations for protecting your information by selecting strong passwords and storing and managing them safely. Included are common mistakes and remedies as well as using password managers.