More than half of the world’s population uses at least one social media platform. Users can post to Facebook, Instagram, and Snapchat for all their followers to see. When a…
Year: 2022
Smishing Is 50% Off!
Have you ever received text messages about special discounts or promotions for a service you use? Many legitimate organizations send promotional text messages to their customers. Unfortunately, cybercriminals are sending…
Social Engineering Red Flags #1: Sender
Cybercriminals send more phishing emails now than ever before. When you receive an email, it’s important to look for any red flags. One red flag you can look for is…
Is Your Grandma Really Selling Furniture on Social Media?
For years, cybercriminals have used social media to post fake listings for popular items such as furniture or electronics. As these scams have grown in popularity, many people have learned…
Lock Your Screen
Locking your screen when you leave your desk is a simple way to keep your information secure and is often overlooked. Keeping your screen unlocked can be dangerous for a…
TikTok Filter Scams
The social media app TikTok is popular for its creative audio and visual filters. TikTok adds and removes filters frequently, so some users may look for ways to access filters…
URLs Are Only Half the Story
If you’ve taken security awareness training, you have probably been taught to hover your cursor over a link to view the destination URL. Checking the URL for things like misspellings,…
Homoglyph and Unicode Phishing Scams
You may be wondering what homoglyphs and Unicodes are. Homoglyphs are letters or characters that look similar. For example, the character “e” looks similar to the character “ė”. Unicode is…
How to Be Prepared for Future Threats
New innovations in technology are being developed at a rapid rate. But new technology comes with new risks. Let’s go over some examples of how technology will change in the…
Clone Phishing Scams
Organizations often use email to send important information to their customers. If an organization sends out an email that’s missing information, they may send you a follow-up email. Now, cybercriminals…