Protecting your business or organization form computer hackers is a never ending job.

Image
cyber hero academy graphic

Since online technology is constantly evolving, the extent, nature, and risks of a cyberattack are impossible to predict.

Image
cybercrime illustration

It’s that time of year again when online shopping is on the rise. Although it’s convenient, quick, and easy to order your holiday gifts from your favorite Internet shops, it’s important to protect your banking or credit card information when making purchases.

Image
Young woman online shopping

Cyberbullying is the repeated use of information technology to deliberately harass, threaten, or intimidate others. Cyberbullying can take many forms, and a single incident may fit into several categories.

Image
cyber bullying graphic

The first step to securing your information is to password-protect your different accounts.

Follow these tips when selecting a password:

Image
setting a good password

Most households now run on wireless networks of devices linked to the Internet. This means that every device is connected to a wireless access point controlled by an Internal router. Devices that may connect to a router include:

Image
Man on cell phone at home

Identity theft is when someone steals your personal information and uses it to commit fraud under your name. This serious crime can wreak havoc on your finances, credit history, and reputation. Follow these tips if you believe that you are the victim of identity theft:

Image
Illustration of identity theft

So you think you're the victim of a cybercrime.. now what?

Image
reporting a cybercrime

Today’s mobile devices are just as powerful as any personal computer, so it’s important that you take the same online safety precautions with your smartphone and tablet as you do with your computer.

Image
Student in a crowd holding cell phone

Social networking sites such as Facebook and Twitter are a great way to stay connected with others, but you should be wary about how much personal information you post. Threats commonly found on social networking sites include the following:

Image
socially responsible graphic