Identity Thieves are Great Impersonators. Don’t Get Fooled!

blog-tags
Author Image
by: Julie R.
From sending emails that appear to be from companies you know and trust, requesting donations in light of the recent natural disasters (fires, hurricanes, and earthquakes), utilizing fear from the recent Equifax data breach to obtain personally identifiable information (i.e. credit card data, account information, etc.), to adding card-reading devices to ATMs,…

Internet Security: Mistaken Beliefs – Part 1

blog-tags
Author Image
by: Kara S.
When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. For the next few weeks we’ll be laying out some mistaken beliefs. Which of them apply to you? I don’t worry…

Internet Security: Mistaken Beliefs – Part 2

blog-tags
Author Image
by: Kara S.
It’s time to learn more about some Mistaken Beliefs when it comes to your security on the internet. When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. Below are some…

Internet Security: Mistaken Beliefs – Part 3

blog-tags
Author Image
by: Kara S.
It’s time once again to learn about Mistaken Beliefs when it comes to your security on the internet. When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. Below are some…

Internet Security – Mistaken Beliefs – Part 4

blog-tags
Author Image
by: Kara S.
It’s time once again to learn about Mistaken Beliefs when it comes to your security on the internet. When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. Below are some…