Just The Facts: Zip, zap, don’t click on that!

New top-level domains are causing chaos, but we’re here to keep you informed and safe while browsing the web.

Parts of a URL

Protocol

Knowing a few important parts of the URL will help you stay safe. First, the Protocol is where you will see https:// or http://. The HyperText Transfer Protocol (HTTP) requests the contents of the website and allows you to see it on your end.

Just The Facts: Cellphone chaos

Recent headlines have been filled with mobile security concerns. This month's newsletter explores issues related to cell phones and provides information and advice from our Principal Cybersecurity Advisor, Keatron Evans.

Now that everyone is walking around with data in their pockets, mobile security is more important than ever! Follow good mobile security habits to keep your information protected.

Just The Facts: Hot off the press!

Has there been a rise in cybersecurity-related issues worldwide? This month's newsletter will touch on recent topics and advice from our Principal Cybersecurity Advisor, Keatron Evans.

A lot of cybersecurity headlines are reaching our desks lately, but does that mean we have to be on high alert? Luckily, we can continue to apply the same cybersecurity standards to protect ourselves.

Just The Facts: Is your computer considered CLEAN?

In cybersecurity, a “clean” desk doesn’t mean a tidy desk.

It can be easy to let our workspace get a little messy with our busy days. We have notes to ourselves, documents (digital and physical) and devices galore. All of this can start to clutter our desks, and clutter is one thing, but keeping our desks cyber-secure is another.

Just The Facts: Clean and safe computers

February has two days dedicated to our computers and their safety. Tuesday, February 7th is International Safer Internet Day and Monday, February 13th is National Clean Out Your Computer Day. Both days are an excellent reminder to think critically about what we do on our devices and how we can keep ourselves and our organizations safe.

Just The Facts: Ring in the new year cyber-safely!

It’s a new year! Let’s start with some new habits to keep you cyber-safe!

Hover over links

Links in emails, texts or direct messages can contain malware. One way to verify whether the link is legitimate is to hover your pointer over the link (do not click!) and check the URL at the bottom of the screen.

Just The Facts: Hacked for the Holidays 2022

Stay ahead of the hackers this holiday season! This month’s newsletter will highlight a few helpful tips to keep you and your family safe from scams.

Charity scams

Charity scams are in full effect around the holidays. Scammers are looking to take advantage of people who want to donate to charity.

Just The Facts: Multi-factor authentication (MFA) fatigue

MFA fatigue attacks are on the rise

In this month’s newsletter, we highlight a growing form of attack: MFA fatigue. Just as MFA has become more widely used, attackers have found a way to get around MFA push notifications. This identity-based attack is designed to remove security barriers and is sure to put companies and individuals on high alert.

Just The Facts: National Cybersecurity Awareness Month

Cybersecurity Awareness Month

Every October is National Cybersecurity Awareness Month. Private companies and government agencies come together to raise awareness on cybersecurity topics critical to protecting your safety online. This year, National Cybersecurity Awareness Month focuses on four topics: recognizing and reporting phishing, using strong passwords and a password manager, updating software and enabling multi-factor authentication (MFA)

Recognizing and reporting phishing emails

Cybercriminals sent over 3.3 billion phishing messages and caused over 4,000 data breaches, exposing over 22 billion personal records.

Just The Facts: Security on the go

Keeping your mobile devices secure

Mobile security is more important now that everyone is walking around with personal and professional data in their pockets. Follow good mobile security habits to keep your information protected.

Public Wi-Fi
When using public Wi-Fi, you send data across a network controlled by someone else.