Cybersecurity Tips Blog

The term "cybercrime" is usually referred to as any criminal offense committed against or with the use of a computer or computer network. A cybercrime incident can lead to loss of business and consumer confidence, financial loss, productivity loss, and even loss of intellectual property.

If you become a victim of a cybercrime, you should report the incident to the appropriate law enforcement authorities. Depending on the scope of the crime, the appropriate agency may be local, state, federal, or even international.

Report a cybercrime to:
-Department of Justice: Reporting Computer, Internet-Related, or Intellectual Property Crime
-Federal Bureau of Investigation: Internet Crime Complaint Center (IC3)

Security Key Enforcement was launched in January 2017 and allows a G Suite Enterprise domain admin to enforce the use of security keys as a two-factor authentication option to protect users against phishing. In addition to security key enforcement, G Suite domain admins also have the options of other 2SV methods such as the Google Authenticator app, text message, or phone call. To make 2SV deployment easier at your domain, they've added two new options in the Admin console:

Admin-led security key enrollment for end-users: Admins can now enroll security keys on behalf of their users. After navigating to the User page from Admin console, click ADD NEW KEY, and you can add a new security using the standard security key enrollment process.



2SV enrollment periods: Currently, whenever a new user is created in an organizational unit where two-step verification (2SV) is enforced, that user has to use 2SV from his or her first login. From administrator feedback, we found that enrollment perio...

Phishing scams continue to proliferate at alarming rates and are becoming more and more difficult to detect. It's important for you to understand how to recognize a phishing attempt and what you can do to protect yourself.

What Can I Do?
Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it. You can also forward it to the Federal Trade Commission at spam@uce.gov.


Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.

Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don't ask for personal information via pop-up screens.

Install a phishing filter on your email application and also on your web browser. These filters will not keep out all phishing messages, but they will reduce the number of phishing attempts.

Using a public wi-fi network not only puts your personal devices at risk, but also exposes your traffic to everyone else using the same network. Cyber-criminals can potentially access any information you provide, such as credit card numbers, confidential information, or passwords. If a public wi-fi network is your only option, consider following the tips listed below to help keep you secure.

How to Stay Safe Using Public Wi-Fi

  • Use a VPN.

  • Use two-factor authentication.

  • Use anti-virus software and keep it up-to-date.

  • Turn off sharing.

  • Be sure you're using HTTPS.

Don't leave your computer vulnerable. Keep your systems patched and up-to-date with the latest security patches from vendors. Doing so will help prevent worm infections and keep your systems protected.

When visiting unknown websites, be vigilant about protecting your identity. Remember that some information is automatically made visible to the site. Information such as the computer's IP address, domain name (e.g., .com, .gov, or .edu), software details, and page visit information is often saved in cookies so that the organization may develop and store user profiles of website visitors. If a website uses cookies, the organization may be able to collect even more information, such as your browsing patterns, which include other sites you've visited.

If the site you're visiting is malicious, the files on your computer, as well as passwords stored in the temporary memory, may be at risk. Generally, organizations use the information that is gathered automatically for legitimate purposes, such as generating statistics about their sites. Be careful supplying personal information. Unless you trust a site, don't give your address, password, or credit card information. Look for indications that...

Please reload

Archive
Please reload

1398 Sperber Road

El Centro, CA 92243

(760) 312-6158