Most households now run on wireless networks of devices linked to the Internet. This means that every device is connected to a wireless access point controlled by an Internal router. Devices that may connect to a router include:

Image
Man on cell phone at home

Identity theft is when someone steals your personal information and uses it to commit fraud under your name. This serious crime can wreak havoc on your finances, credit history, and reputation. Follow these tips if you believe that you are the victim of identity theft:

Image
Illustration of identity theft

So you think you're the victim of a cybercrime.. now what?

Image
reporting a cybercrime

Today’s mobile devices are just as powerful as any personal computer, so it’s important that you take the same online safety precautions with your smartphone and tablet as you do with your computer.

Image
Student in a crowd holding cell phone

Social networking sites such as Facebook and Twitter are a great way to stay connected with others, but you should be wary about how much personal information you post. Threats commonly found on social networking sites include the following:

Image
socially responsible graphic

Phishing email messages are crafted to look as if they’ve been sent from a legitimate organization. They often urge you to act quickly because your account has been compromised or someone is trying to send you money. Don’t take the bait!

Image
Phishing for Fish Logo

It’s more important than ever to “Be Cyber Aware.” But what does that really mean? Simply put, it means thinking through your daily interactions with technology whether that’s checking your email, posting to social media, or shopping online.

Image
Be Cyber Aware graphic