On Wednesday, January 25th Alicia will be doing a CLE webinar for the ACBA. She will be speaking on, "What You Need to Know to Be More Proactive About Cyber Security". Alicia’s seminar will review what you need to know to be more cyber secure and technology competent to help prevent a cybercrimin ...
When
it comes to cybersecurity, criminals will try anything to get access to your
data. Threats ranging from dumpster diving for decommissioned computers to
theft and misplaced devices can allow private information to fall into the
hands of cyber criminals. While things such as screen locks, physic ...
From
your online banking accounts to your social media accounts and everything in
between, you must protect your online accounts with strong and unique
passwords. With the average user having dozens of online accounts, it becomes a
nearly impossible task to remember a long and complex password for ...
Cyber security is the major hot topic
issue when talking about technology. We hear in the news constantly about data
breach after data breach and how another company was hacked. One major way we
can protect ourselves and our businesses is by updating third party apps. Most
people view these apps as ...
“An ounce of prevention is worth a pound of cure” originated
in 1736 by Benjamin Franklin to educate the citizens of Philadelphia about fire
prevention and awareness. The phrase was used to convince the citizens of the
city that it is better to prevent fire than fighting a fire and rebuilding
a ...
Phishing
attacks are one of the most common attacks that cybercriminals will use to gain
one’s login credentials or gain access to a network. According to the FBI
phishing attempts nearly doubled from 2019 to 2020, and these attacks are
steadily on the raise. The most popular phishing method is t ...
We
live in a new digital age where we see both our personal and work lives become
increasingly more dependent on our computers. The things we once did
traditionally such as, banking, taxes, mail, etc., we now do virtually through
our phones and computers. This has become a great convenience for our ...
It
seems like we hear about a new major network infiltration, data leak, or
ransomware attack almost daily. But unlike the TV image, most hackers are not
executing complex code or exploiting vulnerabilities in unpatched systems. On
the contrary, the most easily exploited weakness in modern cyber in ...
Cyber security is a fast-moving target, and therefore, I
regularly recommend and implement new and improved security protocols to my
client’s IT and network infrastructure. Most clients agree to the new and
improved security protocols to protect their IT, company information, and
client data, but ...
People the world over have begun to fundamentally change how
they live their lives due to the far-reaching effects of the Coronavirus. We
have had to change how we learn, how we shop, and how we conduct business. As
we adapt, so do cyber-criminals. Malicious actors online have begun preying on
the ...