Post info:

Week 2: #CyberAware Tips for Parents, Teachers and Industry Professionals

Volunteer at school, an after-school program, Boys & Girls Club, or community workshops to teach kids about online safety and cybersecurity careers. + Check out NCSA’s online safety resources for ideas on what topics to cover and materials you can use Expose students to opportunities in the field of cybersecurity by hosting an open house at your company to talk about what your cybersecurity department does. Work with your schools or community-based organizations to create an internship program for hands-on

Read the full post

Post info:

NCSAM Week 1

NATIONAL CYBERSECURITY AWARENESS MONTH Week 1 CYBER SAFETY STARTS AT HOME! KEEP A CLEAN MACHINE Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats. Remember, mobile phones and tablets need updating too! LOCK DOWN YOUR LOGIN Usernames and passwords are not enough to protect key accounts like email, bank and social media. Improve account security by enabling strong authentication tools such as biometrics or unique one-time codes. SHARE

Read the full post

Post info:

October is NATIONAL CYBERSECURITY AWARENESS MONTH

Infotech will be celebrating NCSAM this year with weekly security tips and guidance. Stay tuned for updates. Overarching Theme Cybersecurity is our shared responsibility and we all must work together to improve our Nation’s cybersecurity. Week 1: Oct. 1­–5: Make Your Home a Haven for Online Safety  Week 2: Oct. 8–12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity Week 3: Oct. 15–19: It’s Everyone’s Job to Ensure Online Safety at Work Week 4: Oct. 22–26: Safeguarding the

Read the full post

Post info:

Infotech Solutions – Managed Services

Did you know Infotech provides Managed Firewall plans for small to medium sized business? If you are unsure of your current security posture contact Infotech for a free assessment today! Do you already have IT? We have plans for that too. We can assist your already overloaded IT with easy remote access, patch management, anti-virus management, asset & software reporting, as well as scripting. We also provide cyber security packages and guidance to assist with ransomware prevention and lock down.

Read the full post

Post info:

Lock your Computer

  Many times people are worried about people hacking into their computer and stealing their information. Some instances the computer is simply left unattended. Whenever you are not at your computer, you should always sign out before you leave or lock the workstation. To execute this, one would typically go to the start menu, power settings, then sleep. That sequence will log you off of the PC. Rather than going through all of those clicks, simply hold the Windows button

Read the full post

Post info:

Has your email address been compromised?

You can check to see if your email address has been compromised by some of the data breaches. Simply go to haveibeenpwned.com and enter your email address. Once you enter your questioned email, you will either get good news that it hasn’t been part of any breaches…yet, or it will let you know what breach your information was a part of. In the event your email was a part of the data that was breached, it doesn’t mean the bad

Read the full post

Post info:

Information Leak: LifeLock

It seems a flaw within LifeLock’s website may have exposed all of the emails of their subscribers. While the exposure of email without any other information like passwords or personal information seems harmless in itself, it now brings the substantial threat of spear phishing attacks. “If I were a bad guy, I would definitely target your customers with a phishing attack because I know two things about them,” Reese said. “That they’re a LifeLock customer and that I have those

Read the full post

Post info:

Email SpearPhishing/Extortion

We have noticed a new phishing scam come through. However, this scam involves a portion of the user’s credentials (username and/or password). Below is an example of the text in the body of the email. The email address and known password have been redacted. “Lets get directly to point. Not one person has compensated me to check about you. You may not know me and you are most likely wondering why you are getting this e-mail? actually, I actually placed

Read the full post

Post info:

Notification Law

The new South Dakota Breach Notification Law was enacted on July 1, 2018. While the organizations throughout the state are learning more about the rules, wording, & procedures as the days go by, a North Carolina federal court decision has made a ruling that could impact the rest of the nation.  “According to a recent federal court decision, an employee who is tricked into sharing personal information in response to a phishing email can be seen as committing an intentional disclosure under

Read the full post

Post info:

Do you own an Amazon Fire TV or Stick?

There are a TON of apps/programs that offer some sort of “free” content that we download on our computer and phones. With that “free” content, you may be getting more than you initially thought. You may also be downloading viruses & malware. Amazon Fire TV & Fire Stick are now also at risk of downloading content that could infect other Android decics that are connected as well. If you are using the Fire TV & Stick, in accordance with the

Read the full post

Posts navigation