Article Archives

March 21, 2019
Social Media Is Here to Stay: Time to Start that Workplace Policy

As of mid-September 2009, there are 300 million Facebook users worldwide. The announcement came just two months after the company reached 250 million users in July. For those of us not inclined to do the math, at the current rate, Facebook is growing to the tune of 25 million new users per month.

March 21, 2019
11 tips for social networking safety
Social networking websites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages.  As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic.
March 21, 2019
Sold a Lemon in Internet Banking
An online bank robbery in which computer crooks stole $63,000 from a Kansas car dealership illustrates the deftness with which cyber thieves are flouting the meager security measures protecting commercial accounts at many banks:
March 21, 2019
Cyber Security

Malware used to harvest bank account logons and send wires, FBI warns

The ease and speed of online business banking may be giving way to a growing amount of fraud. This month the Federal Bureau of Investigation warned about "a significant increase" in online banking frauds perpetrated on small and midsize businesses and local governments.

March 21, 2019
It may mean one thing on TV
It may mean one thing on TV, but to savvy business executives, “CSI” should stand for Carefully Secure Information. Every company has an obligation to its customers, affiliates, and employees to safeguard sensitive data. As outlined in the Federal Trade Commission’s new handbook, Protecting Personal Information: A Guide for Business, one step of the process is to “Take Stock” — conduct a CSI-style “forensicaudit” of your information practices.
January 10, 2019
Take Stock – Conducting a Data Security Audit in Your Office

It may mean one thing on TV, but to savvy business executives, “CSI” should stand for Carefully Secure Information. Every company has an obligation to its customers, affiliates, and employees to safeguard sensitive data.

January 10, 2019
10 Ways Businesses Can Help Protect Their Customers from Phishing
Phishing is a particularly devious form of Internet scam. Consumers are the target for “phishers” who trick them into divulging sensitive personal information such as their credit- or debit-card account numbers and personal identification numbers (PINs), by making bogus offers using spoof emails and fake Websites. Phishing leads to identity theft.
January 10, 2019
WiFi Security: Four Fabulous Tips from the FBI
You’re at the airport waiting for your flight. With time to kill, you’re thinking of connecting your laptop to the airport's Wi-Fi to check your office e-mail...do some personal banking...or shop for a gift for your spouse.
January 10, 2019
Cyber Attacks Rise on Online Business Banking

Malware used to harvest bank account logons and send wires, FBI warns...

January 10, 2019
How to Detect and Remove Keylogging Malware
Keylogger malware is one of the most dangerous threats to a PC user's privacy. This type of malware installs itself as a result of clicking while browsing the Internet or downloading software. Keyloggers keep track of all of your keystrokes when you are using your PC and then transfer the information to a remote server. It is capable of recording all of your online conversations, emails, and password logins, as well as creating screenshots of all of your PC activity.
January 10, 2019
The Lowdown on Laptops: Data Security for the Road Warrior
Scan the lobby at any office building and you'll see them: Busy executives scrolling through messages on their PDAs, flipping through stacks of client files, and carrying on animated conversations with colleagues via cell phone. No one appreciates the convenience of today's virtual office more than the globetrotting Road Warrior. But are you maintaining the same high standards for data security when you're on the go?
October 11, 2010
How to Beat Keyloggers

Zeus is not alone.

In fact, the sheer number and insidious nature of the Zeus Trojan and other types of keylogging malware have financial institutions and their customers on high alert for fraud.