These are EVERYWHERE now. Be aware that anyone can create QR codes, and they are trivial to place in public areas. An attacker could send you to any website and…Learn MoreQR Codes
Initial info on the “CMMC changes” we’ve been hearing about is here. I’m glad to reflect on taking the common sense route from the start when advising. “What should we…Learn MoreCMMC 2.0 – CMMC Changes
Our friends at Cybercrime Support Network are working hard to compile a catalog of resources to assist survivors of cybercrime on their road to recovery. Their Cyber Resource Catalog lets…Learn MoreCyber Resource Catalog
10 Week Virtual Program – 1 hour weekly sessionsTo meet the needs of individuals impacted by romance imposter scams, Cybercrime Support Network has developed a Peer Support Program. This program…Learn MoreCSN: Peer Support Program
Everything depends on your domain name. How are you protecting it? -Who is (whois!) your registrar?-Who has access to your account?-What email address is associated with your account? How is…Learn MoreDomains, Registrars, and DNS
Phishing emails or text messages may appear to come from a company you trust and claim that there is a problem with your account or your payment information. The email…Learn MorePhishing resources for personal accounts