Just The Facts: Safeguard your SEA-cret data

The internet is full of choppy waters — learn how to navigate your inbox safely.

Phishing is what everyone is always talking about and for good reason. Phishing is the leading cause of cyberattacks. According to The Psychology of Human Error, research by Tessian, nearly half of employees are "very" or "pretty" certain they have made a workplace mistake with security repercussions.

Just The Facts: File sharing scares

The days of paper files are gone. All our information is online or stored on our localized devices — hopefully secured. As part of working remotely and worldwide business partnerships, it is critical that we transfer data one way or another. And with that, we need to ensure that our files are secured while they are stored and in transit.

Just The Facts: Zip, zap, don’t click on that!

New top-level domains are causing chaos, but we’re here to keep you informed and safe while browsing the web.

Parts of a URL


Knowing a few important parts of the URL will help you stay safe. First, the Protocol is where you will see https:// or http://. The HyperText Transfer Protocol (HTTP) requests the contents of the website and allows you to see it on your end.

Just The Facts: Cellphone chaos

Recent headlines have been filled with mobile security concerns. This month's newsletter explores issues related to cell phones and provides information and advice from our Principal Cybersecurity Advisor, Keatron Evans.

Now that everyone is walking around with data in their pockets, mobile security is more important than ever! Follow good mobile security habits to keep your information protected.

Just The Facts: Hot off the press!

Has there been a rise in cybersecurity-related issues worldwide? This month's newsletter will touch on recent topics and advice from our Principal Cybersecurity Advisor, Keatron Evans.

A lot of cybersecurity headlines are reaching our desks lately, but does that mean we have to be on high alert? Luckily, we can continue to apply the same cybersecurity standards to protect ourselves.

Just The Facts: Is your computer considered CLEAN?

In cybersecurity, a “clean” desk doesn’t mean a tidy desk.

It can be easy to let our workspace get a little messy with our busy days. We have notes to ourselves, documents (digital and physical) and devices galore. All of this can start to clutter our desks, and clutter is one thing, but keeping our desks cyber-secure is another.

Just The Facts: Clean and safe computers

February has two days dedicated to our computers and their safety. Tuesday, February 7th is International Safer Internet Day and Monday, February 13th is National Clean Out Your Computer Day. Both days are an excellent reminder to think critically about what we do on our devices and how we can keep ourselves and our organizations safe.

Just The Facts: Ring in the new year cyber-safely!

It’s a new year! Let’s start with some new habits to keep you cyber-safe!

Hover over links

Links in emails, texts or direct messages can contain malware. One way to verify whether the link is legitimate is to hover your pointer over the link (do not click!) and check the URL at the bottom of the screen.

Just The Facts: Hacked for the Holidays 2022

Stay ahead of the hackers this holiday season! This month’s newsletter will highlight a few helpful tips to keep you and your family safe from scams.

Charity scams

Charity scams are in full effect around the holidays. Scammers are looking to take advantage of people who want to donate to charity.

Just The Facts: Multi-factor authentication (MFA) fatigue

MFA fatigue attacks are on the rise

In this month’s newsletter, we highlight a growing form of attack: MFA fatigue. Just as MFA has become more widely used, attackers have found a way to get around MFA push notifications. This identity-based attack is designed to remove security barriers and is sure to put companies and individuals on high alert.