Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
Daily News Flash
Daily News Flash
Tune into your inner cyber detective when receiving phone calls requesting sensitive information. Instead of divulging details, hang up and independently verify the caller's legitimacy by dialing official contact numbers. Avoid giving away your phone number to strangers, especially online, to minimize unwanted vishing calls.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
August 20, 2023 20:38 (on 8/21/23) | 0 | QR Ready | 1 minute read
Protect yourself from deceptive SMS scams by being wary of unusual texts, especially those that sound urgent or unreasonably appealing. Instead of succumbing to temptation and clicking on the links, verify the source of the information through a reliable channel. Avoid having your phone number used in unsolicited smishing efforts by never posting it in public forums.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
August 20, 2023 20:35 (on 8/21/23) | 0 | QR Ready | 1 minute read
Be a smart internet user and use caution when you receive emails requesting personal information or prompt responses. Always check the sender's identity and hover over links to view URLs before clicking to avoid falling victim to phishing scams. Create email filters to automatically categorize and label incoming messages so you can more readily identify skeptical messages.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
August 20, 2023 20:32 (on 8/21/23) | 0 | QR Ready | 1 minute read
Search engine phishing is a sneaky tactic used by cybercriminals to deceive you. They manipulate search results, making fake websites appear real. If you click on these links, they can steal your sensitive information, such as passwords or personal details. To protect yourself, exercise caution with search results, verify website URLs, and maintain strong cybersecurity awareness in the digital space. Stay alert and help keep our data safe!
Got questions? Submit a ticket at [PB8324.3]...
August 7, 2023 02:34 (on 8/7/23) | 0 | QR Ready | 1 minute read
Are you uncertain about responding to an email from an unfamiliar sender? Follow these guidelines to help determine its legitimacy: search for signs of phishing in the email or message, such as spelling and grammar errors, unusual sender addresses, and odd request patterns. Remember to always be cautious of online content and never believe anything that appears too good to be true.
Got questions? Submit a ticket at [PB8324.3] Data Security Support.
August 7, 2023 02:34 (on 8/7/23) | 0 | QR Ready | 1 minute read
Personalized phishing messages pose a significant threat to our online security. Scammers utilize information gleaned from social media and other public sources to craft messages that appear genuine and tailored to individuals. To ensure our safety, we must all exercise caution and undergo training to identify such fraudulent messages. Implementing additional security measures such as two-factor authentication and email verification can provide added protection. Additionally, it is crucial...
August 7, 2023 02:33 (on 8/7/23) | 0 | QR Ready | 1 minute read
Utilizing real-time location sharing can be convenient, but it's important to restrict its usage to essential situations. Continuous sharing poses potential risks to privacy, including stalking, security breaches, identity theft, and social engineering. To safeguard yourself, consider adjusting application settings, disabling location services when not required, carefully choosing who can access your location, refraining from public sharing, and regularly reviewing app permissions. By...
August 7, 2023 02:32 (on 8/7/23) | 0 | QR Ready | 1 minute read
If you observe any unusual activity, or security breaches, or if your device is lost or stolen, please promptly alert the IT or security team. This proactive approach helps prevent the situation from escalating into a more significant problem that demands additional resources for resolution. Remember that you hold the responsibility for securing your device. By identifying issues at an early stage, you can mitigate further damage and enhance the company's overall cybersecurity...
August 7, 2023 02:32 (on 8/7/23) | 0 | QR Ready | 1 minute read
Enable automatic locking on your devices to protect them in various settings (home offices, coworking spaces, and public areas). This safety measure prevents forgetfulness and potential security breaches when leaving your devices unattended. Choose appropriate automatic lock times, such as 30 seconds for mobile devices and five minutes for computers. While modern devices typically have this feature enabled by default, remember to check and adjust settings as needed. By doing so, you create...
August 7, 2023 02:31 (on 8/7/23) | 0 | QR Ready | 1 minute read
Vishing, or voice phishing, is a deceptive technique wherein cybercriminals impersonate legitimate individuals or organizations over the phone to manipulate you into revealing sensitive information or performing actions that compromise your security. When receiving unsolicited calls requesting personal or sensitive information, be cautious. Avoid providing any details immediately. Instead, independently verify the caller's identity by using official contact information from trusted...
August 7, 2023 02:30 (on 8/7/23) | 0 | QR Ready | 1 minute read