'Have I Been Pwned' is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach. See the "Have I Been Pwned" website for more information and to check if you have an account that has been compromised in a data breach.
Show All Answers
Phishing is the process of attempting to acquire sensitive information by pretending to be a trustworthy email link or attachment. This article from kotman.com lists the top email subject lines in phishing emails. Use this information to prevent becoming a victim yourself.
Cyber criminals have so many weapons nowadays, but the most common attack that you’ll receive is a Phishing Email, and almost everyone can recall a time when they’ve received one. The worst phishing emails are easy to identify, and most people will just ignore them. But cyber criminals are getting smarter, and their tools are getting more convincing and easier to fall for. Check out this article from etechcomputing.com for 6 Sophisticated Phishing Emails and Why They'll Trick You.
For decades, phishing has proven an effective method for attackers to dupe just about anyone into clicking on malicious links so they can wreak havoc on personal and professional lives. Alphabet made a quiz to help you detect phishing scams.
It's easier than you think for someone to steal your password. See this Google web page on how to set up two-step verification on your Google account for an extra layer of protection for your Google account.
Two-step verification helps protect you by making it more difficult for someone else to sign in to your Microsoft account. It uses two different forms of identity: your password, and a contact method (also known as security info). Even if someone else finds your password, they'll be stopped if they don't have access to your security info. See the Microsoft website for instructions on how to set up two-step verification on your Microsoft account for an extra layer of protection.
Watch this video from Petri IT Knowledgebase on how to be more secure by setting up two-step verification for Microsoft O365.