Beware of voice cloning scams
In this month’s Cybersecurity Minute, we wanted to bring awareness to trending scams involving artificial intelligence (AI’s), voice cloning technology. Here’s what you need to know: Cybercriminals are using voice…
What is “juice jacking”?
How does it work? Although not new, “juice jacking” continues to be a form of security exploitation which many still are not familiar with. This form of crime utilizes public…
Tax Season Scams “crash-course”
Tax Season Scams “crash- course” As you may be aware, tax season is here and cybercriminals are more than ready to capitalize on the vulnerable and unaware. But that doesn’t…
Top cybersecurity predictions for 2023
The cybersecurity world never stands still, with threats and the technology to combat them constantly evolving, cybercrime, unfortunately, continues to be an industry on the rise. Just last year, the…
What are Authenticator Apps for?
What are Authenticator Apps? Are you who you say you are? Prove it, twice! Most people and companies already know that protecting your cyber identity with a single identity verification…
Trending payment scam and how to protect yourself
In this month’s cyber-security minute, we hone in on a trending payment scam which uses Zelle. You may be familiar with Zelle; however, if you’re not, it’s an app, used…
Avoid Using Public Wi-Fi Connections
Cybersecurity Minute: Avoid Using Public Wi-Fi Connections, even when they are password protected. Here’s why: While public networks are convenient, they pose a big security risk. Avoid connecting to public…
What Employers need to know about “BYOD”
Often times, companies may think that allowing or requiring employees to “BYOD” bring their own devices to work offers convenience on both ends and helps the company cut costs related…
What is “Conversation Hijacking”?
With cyber-crime becoming a new “norm” in our digital world, and the need to deal with a whole new level of sophistication, in this month’s Cybersecurity Minute, we wanted to…