February 6th, 2019
January 16th, 2019
Google searches can be a normal part of anyone’s day. Typically you get the results you need, but sometimes malicious ads, or Malvertising, can find their way in your search results. On today’s One-Minute Wednesday, Rachel Telander will provide some steps to stay on guard when encountering ads in your search results.
December 5th, 2018
October 31st, 2018
Cybercriminals are always innovating new ways to steal your data, so it’s imperative to stay vigilant as you spend time online and in your email. On today’s One-Minute Wednesday, John McCormack will discuss a new threat called Homographic Domains, which are fake web addresses that use special characters to make themselves look exactly like the real domain they are copying.
September 5th, 2018
A new cyberattack called “PhishPoint” is currently threatening Office 365 users. PhishPoint bypasses Microsoft’s security by hiding malware inside of SharePoint documents that steal your Microsoft credentials. On today’s episode of One-Minute Wednesday, Ross Heuer will cover how this attack operates and the steps to keep yourself from becoming a victim of this scam.
August 1st, 2018
BlueBorne is a new cyber-threat that is attacking Bluetooth-enabled devices. Hackers are using Bluetooth connections to infiltrate and steal information from phones, laptops, and more. On today’s episode of One-Minute Wednesday, Nathanael Emenaker will go over the basics of how this malware works and the steps you can take to keep yourself secure.
June 27th, 2018
Cybercriminals continue to innovate sophisticated new attack vectors, but email phishing is still the most common and effective tactic for criminals looking to steal money or sensitive data. On today’s One-Minute Wednesday, Drew Lawson will discuss a common phishing tactic called business email compromise (or BEC) and review some ways to identify and protect yourself from this type of attack.
May 30th, 2018
On this week’s One Minute Wednesday, Melanie Nunn will be giving an overview of social engineering tactics. Cybercriminals commonly use social engineering schemes to manipulate their targets into giving up sensitive information. And since these attacks can come from a variety of angles, it’s important for you to identify the features of a social engineering attack so you can protect yourself.
April 25th, 2018
Protect your data while browsing the internet in public! On this week’s One-Minute Wednesday, Drew Lawson will be discussing some of the risks associated with public wi-fi networks, and how to avoid falling victim to “man-in-the-middle” attacks. Don’t miss out on these valuable tips for keeping your data secure.
April 18th, 2018
Our mobile devices are a part of today’s everyday life. We perform a multitude of daily tasks on them that reach far beyond just making phone calls. But mobile technology, such as smartphones, can be just as vulnerable as any computer to cyber attacks. So in this week’s One Minute Wednesday, Joon Koh will give you some advice on how to keep both you and your data secure when doing different functions on your device.
March 21st, 2018
Google Chrome extensions are great tools for boosting your productivity and giving you a better browser experience. However, some extensions can be infected with hidden malware. On today’s One-Minute Wednesday, Issac McIntosh will give a few examples of malicious extensions along with some precautionary steps you can take to stay protected.