Cybersecurity Tips Blog

ATM Skimmers are devices that criminals place over or on ATM machines to steal your card information, including your pin number. While the tricks used by these thieves can be complicated, there are a handful of simple methods to properly protect your financial information:

Choose your ATMs wisely.
Look for ones that are within bank perimeters, well lit and/or on busy streets. If possible, try to always use the same ATM, since it will be easier to identify abnormalities.

Hide your pin!

Even though you may be alone, that doesn't mean you are not being watched. Modern day skimmers now also hide little cameras to register you inputting your PIN. If you take the simple precaution of covering your hand while inputting your information, you'll help prevent the criminal from getting this information.

Look for abnormalities.
Most skimmers have to attach their skimming machine over the real ATM using simple adhesives since they often have to quickly remove the device. Check the machine to see if the...

Phishing is when an attacker attempts to fool you into clicking on a malicious link or opening an attachment in an email. Be suspicious of any email or online message that creates a sense of urgency, has bad spelling or addresses you as "Dear Customer."

If possible, have two computers at home -- one for parents and one for kids. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.

Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for code execution. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Successful exploitation of the most severe of these vulnerabilities could result in the attacker gaining control of the affected system.

Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

Please be sure to update your systems.  Reference:

Just like your home, your online accounts can collect clutter and occasionally need a few minutes of care. Start by considering what accounts you have online for both work and home. Chances are your accounts include email, social networks, clubs and organizations, shopping websites, cloud storage accounts, and others. Do you need them all? Is there information in those accounts that isn't needed anymore, such as credit cards saved in your accounts with shops and old documents on cloud storage accounts? Are there accounts that you dont use anymore and can close, like that old email account you never check? Are you using the same password across any of these accounts that you could easily make unique and more secure?

Is there information in your accounts that you can archive or delete? Many email providers have limits on mailbox sizes, and for security reasons it's always smart to limit what is available through your email account. On a side note, how many emails are in your inbox - are there any you can file into folders or delete? And when was the last time you cleared out your deleted items or trash folder? Can you set a rule that will automatically empty your deleted items or trash folder on a regular basis? Unsubscribe to recurring emails that no longer interest you.

Please reload

Please reload

1398 Sperber Road

El Centro, CA 92243

(760) 312-6158