Cybersecurity Tips Blog

Don't put yourself in danger by updating social media and sharing while you are away from home. Wait until you get back. By revealing such specifics while you're gone, you are providing information that could be used by criminals to break into your house.

Another common scam involves individuals going away on vacation and having their email accounts compromised by cyber-criminals who contact the person's friends or family with requests for help, claiming that the person was robbed in a foreign country while on vacation and needs money.

When visiting unknown websites, be vigilant about protecting your identity. Remember that some information is automatically made visible to the site. Information such as the computer's IP address, domain name (e.g., .com, .gov, or .edu), software details, and page visit information is often saved in cookies so that the organization may develop and store user profiles of website visitors. If a website uses cookies, the organization may be able to collect even more information, such as your browsing patterns, which include other sites you've visited.

If the site you're visiting is malicious, the files on your computer, as well as passwords stored in the temporary memory, may be at risk. Generally, organizations use the information that is gathered automatically for legitimate purposes, such as generating statistics about their sites. Be careful supplying personal information. Unless you trust a site, don't give your address, password, or credit card information. Look for indications that...

Screen locking ability exists for a reason. Even if you are leaving for just a few minutes at a time, be sure to lock your screen. Though physical intruders are rare during daytime and in conventionally secured offices, intrusions do occasionally happen. Screen locks also thwart opportunistic insider attacks from other employees that may seek to obtain information or access information beyond what they should normally have. If you don’t adhere to a screen locking policy, an attacker can simply walk up and start manipulating or stealing your information without having to even work at getting in to your system. And remember, you are ultimately responsible for everything done under your login!

Locking your screen is as simple as simultaneously pressing the Windows key + L.  On Macintosh devices, it CTRL + SHIFT + EJECT

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account.

Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on your online activities, steal your passwords and files, or use your system to attack others.

Please reload

Archive
Please reload

1398 Sperber Road

El Centro, CA 92243

(760) 312-6158