Unfortunately, with the rise in unemployment insurance claims associated with COVID-19, there has also seen a rise in fraudulent claims and other instances of fraud.
If you become aware of a fraudulent Colorado unemployment claim filed in your name, there are steps you should follow to report the incident and steps you can take to protect your identity and your credit.
Automakers work hard to reduce the possibility that hackers can steal their cars. But, it’s an ongoing battle between the people who make the systems in vehicles and those who want to exploit them.
A researcher discovered a pair of vulnerabilities that allow the researcher to not only get into a Model X, but also start it and drive away. A fix is coming.
A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts.
In reality, attackers have learned the easiest way to access our devices, accounts and data is to simply ask for them. This article explains how these attacks work and how to easily spot and stop them.
For many, email is a communication necessity. But email is also a mechanism used by attackers to gain access to your most sensitive information.
October is National Cyber Security Awareness Month. Cybersecurity Awareness Month was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004. It was created as a collaborative ef...
In this article, we share our Top 5 recommendations to help you protect your sensitive information.Please note #4 - The Sheriff's Office is hosting a Shred-A-Thon on October 3, 2020.
Learn about the myriad of threats to your financial, personal, and online well-being. Knowledge of these threats is a powerful way to begin to protect yourself.
We all want to protect our digital lives but - passwords - UGH!