Making Sense of Security Online Caution Cyber Tips

5 Cyber Tips for Cautious Online Activity

It’s almost time for the holiday season which means people love to share what they shop for, events and parties they attend and more. From posting to social media to shopping online, the more convenience we have at our fingertips, so do cybercriminals and others with bad intent. Check out these cyber tips below to use caution with your online activity. You are responsible for your online safety. Take the time to not make mistakes. Protect your data. You can get a copy of these tips by clicking here. Online Caution Cyber Tips Passwords and Privacy Settings Choose strong passwords and never share them with anyone else. Check privacy settings often. Verify Downloads  Some programs and apps install malware...

Making Sense of Security Password Tips

Strong Password Tips

Online Safety Guidelines for Strong Passwords Quick tips for creating and saving your online passwords and making them strong. Make Passwords Long Use passwords longer than six characters when possible. Especially with most characters being from the Alphabet.  Don’t Use Personal Information Avoid using demographics, birthdates or names from your loved ones. Including pets.  Change Passwords Often Make sure to review your passwords and change them frequently. Such as quarterly. But no longer than every 6 months.  Password Manager Apps Password management apps can keep track. Use caution. If the PW Manager was hacked, you have to change all your PW’s and worry about ID theft.  Don’t Recycle Passwords Don’t use the same password for all of your accounts....

Making Sense of Security Online Safety Tips

7 Best Online Safety Tips

Best 7 Online Safety Tips Video for Cybersecurity Awareness Month October is National Cybersecurity Awareness Month. Here are some basic online tips from Making Sense of Security to keep your digital activity safe. Don’t Give Out Personal Information Avoid online phishing attempts by keeping your personal information private. Don’t give out your phone number, social security information, or banking info to someone you don’t know. Create Complex Passwords Create passwords with a combination of letters, numbers, and symbols. Consider using password managers to create and keep track of your passwords. Check Website Reliability Before purchasing anything on a website ensure that it’s safe. You can do this by checking if it has a small lock icon or “https” before...

Simple steps to protect yourself against identity theft

Simple steps to protect yourself against identity theft

As we enter the New Year, be sure to keep up, or adopt, these good data security habits to avoid identity theft   Are you doing enough to reduce the risk of having your identity stolen? As you start the New Year, this is a good time to reflect on what kinds of measures you should take to prevent thieves from stealing and using your Personally Identifiable Information (PII) for fraudulent activities. As more and more of our personal information is online and cybercriminals target everything from bank accounts to tax refunds, identity theft is a growing concern. With your sensitive information in their hands, crooks can make fraudulent purchases, open new accounts or apply for loans in your...

Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters than emails with malicious attachments or download links. Likewise, conversational phishing attacks, like business email compromise (BEC), have grown more popular. “The vast majority of phishing campaigns are credential theft or conversational,” Cofense says. “While malicious attachments still play a role in phishing, the frequency of this has dramatically declined over the years. In fact, most phish attachments these days are not even malware, but...

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not. This course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as much technology as possible. One of the most common unknown pieces of technology in...

Scroll to top