Show All Answers
Cyber criminals have so many weapons nowadays, but the most common attack that you’ll receive is a Phishing Email, and almost everyone can recall a time where they’ve received one. The worst phishing emails are easy to identify, and most people will just ignore them. But cyber criminals are getting smarter and their tools are getting more convincing and easier to fall for. Check out this article for 6 Sophisticated Phishing Emails and Why They'll Trick You
For decades, phishing has proven an effective method for attackers to dupe just about anyone into clicking on malicious links so they can wreak havoc on personal and professional lives. Alphabet made a quiz to help you detect phishing scams.
'Have I Been Pwned' is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach. See the 'Have I Been Pwned' website for more information and to check if you have an account that has been compromised in a data breach >
It's easier than you think for someone to steal your password. See the Google web page on two-step verification on your Google account for an extra layer of protection >>
Two-step verification helps protect you by making it more difficult for someone else to sign in to your Microsoft account. It uses two different forms of identity: your password, and a contact method (also known as security info). Even if someone else finds your password, they'll be stopped if they don't have access to your security info. See the Microsoft website for instructions on how to set up two-Step verification on your Microsoft account for an extra layer of protection >>
Watch this video from Petri IT Knowledgebase on how to be more secure by setting up two-step verification for Microsoft O365 >>
Phishing is the process of attempting to acquire sensitive information by pretending to be a trustworthy email link or attachment. KnowB4 put together some of second quarter's top phishing issues. The KnowB4 article includes the top 10 social media email subjects, top 10 general email subjects and top 10 "in the wild" attacks >>