Cybersecurity for Small Businesses
PHYSICAL SECURITY: Cybersecurity begins with strong physical security. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences. Here are some examples: An employee leaves a flash drive on a table unattended-papers are thrown away in the trash that should be shredded-a window or door is left unlocked...
The Rise of Digital Payments
The use of digital payments has significantly grown over the past ten years, especially post-2020. Its inception is often paired with online retailers and resell stores, like eBay, bringing the application PayPal into the scene. Nowadays, consumers use digital payments, from online bill pay to splitting dinner with their friends. With the rise of new products like Zelle ®, Venmo, Cash App, Google Pay, and Apple Pay, one thing is clear; peer-to-peer digital transactions are here to stay. Just as new technology grows, so does its counterpart – scams. Scammers are utilizing the urgency and convenience of digital payments to scam consumers. What does this mean for you?
*IMPORTANT PUBLIC SERVICE ANNOUNCEMENT*
When dining out or visiting other public establishments, keep purses, backpacks, bags, etc. within your sight at all times, rather than hanging on the back of your chair or under a table! Thieves sitting at adjacent tables are clandestinely removing wallets, credit/debit cards, etc. from the bag as it hangs on a chair, unbeknownst to the victim, then leaving and quickly making large purchases at local stores using the stolen credit and/or debit cards.
Juice Jacking – Is this a threat against my cell phone and other USB-connected devices?
With vacation time right around the corner, the FCC and the FBI recently released warnings about Juice Jacking. Juice Jacking refers to the threat of malicious access gained to your phone or other USB devices when plugged into a public charging kiosk – such as at an airport. The FCC originally published this warning in 2019.
Thinking Outside the Box
As shippers forecast another record year of holiday deliveries, scammers are ramping up their efforts to take advantage. Here is some advice on making sure those deliveries really are yours.
What To Do If Your Personal Information Is Compromised
While synthetic identity fraud is not a complete takeover of one’s identity, critical pieces of your personal information can be used in creating a synthetic, such as your Social Security number (SSN).