Top 10 Opt Out Tools for Protecting Your Privacy
It’s Data Privacy Week, and there’s no better time to take additional steps to protect your personal information. Below are some of the top tools for opting out of some…
Phishing Evolves to Phone Call Scams
As cybersecurity awareness grows and we all become more vigilant against clicking suspicious links or downloading unexpected attachments, cybercriminals are changing their approach. A particularly concerning trend is the rise…
2025 Security Awareness Calendar: Survive and Thrive in 2025
SEE OUR UPDATED 2026 SECURITY AWARENESS CALENDAR As we enter 2025, threats using Deepfakes and AI are growing, with cybercriminals using AI to steal houses or in impersonation scams. People…
Watching Out for Pig Butchering Scams
Sophisticated scammers are targeting individuals across the globe through text messaging, dating apps, social media, and email. While the tactics have been around for some time, the term “pig butchering”…
Scammers are Using AI to Steal Homes
The Wall Street Journal recently reported on how scammers tried to auction off Graceland—the estate that belonged to Elvis Presley in Memphis, TN and one of the most famous pieces…
See a Fake Online Review – Report it to the FTC
If you are fed up with fake online reviews, you can now officially report them to the FTC. The Federal Trade Commission began enforcing rules that ban companies from buying…
What the Heck is Malvertising?
Search engines just aren’t what they used to be. What was once a simple tool for everything from finding the nearest coffee shop to finding niche information has become a…
Data Stolen on 1 in 3 People Around the World
There are around 8 billion people in the world, and a massive new data breach included about 3 billion compromised records. The data included the names, addresses, Social Security numbers…
How to spot a Business Email Compromise BEC scam
Business Email Compromise (BEC) scams are on the rise and can lead to significant reputational damage and financial losses for companies that are targeted. In these types of sophisticated cyber-attacks,…
