**July 2022- Phishing Attacks Are Getting Trickier** Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails sent by cyber attackers to trick you into doing something you should not do, such as opening an infected em…
**Learn a New Survival Skill: Spotting Deepfakes** **What Are Deepfakes?** The word "deepfake" is a combination of "deep learning" and "fake." Deepfakes are falsified pictures, videos, or audio recordings. Sometimes the people in them are computer-generated, fake identities that look and sound like they could be rea…
**Please Open the Attached PDF** **Demystifying Passwords** 5 Password Myths Debunked How Do Passwords Get Hacked? Password Managers Explained _Password Myths Debunked_ The first use of computer passwords dates back to the early 1960s. Ever since then, they’ve been a source of debate regarding length, complexit…
![][1] **Shopping Online Securely** **Overview** The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online. Unfortunately, cyber criminals will be active as well, creating fake shopping websites and other online shopping scams to steal your info…
![][1] # **Social Engineering Attacks** **Overview** A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your s…
April 2022- [Top Three Social Media Scams][1] **Overview** While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage of millions of people. Don't fall victim to the three most common scams on social media. **Inv…
**March 2022 – Top Cybersecurity Tips for Vacations** **Overview** As Spring Break approaches, you may betraveling. If you are among the many, here are some tips to help keep you cyber savvy and safe. **Mobile Devices** Bring as few devices as you can. The fewer devices you bring while traveling, the fewer devices…
**One Simple Step to Securing Your Accounts** **Overview** Does it seem like cyber criminals have a magic wand for getting into your email or bank accounts and there’s nothing you can do to stop them? Wouldn’t it be great if there was one single step you could take that would help protect you from cyber criminals an…
![][1] **Securely Using Mobile Apps** **Overview** Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so powerful are the thousands of apps we can choose from. These apps enable us t…
**Privacy- Protecting Your Digital Footprint** **What is Privacy? ** There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you would be astounded at all the different entities that not only co…