Security Tip Newsletters & More

 

Monthly Security Tips NEWSLETTERS & More               (Select Below)

Security Tips:


  1. 2019

  2. January - January 28th is National Data Privacy Day


  3. 2018

  4. December - Security and Privacy in the Connected Home

  5. November - Staying Secure While Shopping Online

  6. October - National Cybersecurity Awareness Month

  7. September - Avoiding Many Types of Malware

  8. August - Want to keep your data? Back it up!

  9. July - Sun, Sand, and Cybersecurity

  10. June - How to Spot Phishing Messages Like a Pro

  11. May - Reducing your Information Footprint

  12. April - Securing Devices by Making Simple Changes

  13. March - Staying Safe from Tax Scams

  14. February - Spotting and Avoiding Olympic Scams

  15. January - National Data Privacy Day, January 28th


  16. 2017

  17. December - Avoiding Holiday Scams

  18. November - Shopping Safely Online

  19. October - National Cyber Security Awareness Month 2017

  20. September - Staying Secure on Social Media

  21. August - Connected Home Devices: The Internet of Things

  22. July - Identifying and Reporting Common Scams

  23. June - Sun, Sand, and Cybersecurity

  24. May - Are You Really Being Secure Online?

  25. April - Digital Spring Cleaning

  26. March - Common IT Wisdom That Keeps You Secure

  27. February - Staying Safe from Tax Season Scams

  28. January - Looking Forward: 2017’s Top Threat Prediction


  29. 2016

  30. December - New Device? Check Your CyberSecurity!

  31. November - Cyber Tips for Holiday Shopping

  32. October - Malware

  33. September - Two-Factor Authentication

  34. August - Back to School

  35. July - Going for Gold in Cybersecurity

  36. June - Traveling Securely

  37. May - Cybersecurity Information Sharing Act of 2015

  38. April - Phishing Emails and You

  39. March - Why Strong, Unique Passwords Matter

  40. February - Avoiding Online Tax Scams

  41. January - The Hidden Costs of a Data Breach


  42. 2015

  43. December - Getting Your Device and Checking It Twice

  44. November - Safe Online Holiday Shopping

  45. October - Malware Wears Costumes, Too

  46. September - New Credit Card Chip Technology

  47. August - The Harm in Password Reuse

  48. July - Sun, Sand, and Cyber Security

  49. June - Social Engineering Through The Internet

  50. May - Don’t Take the Bait on Phishing Scams

  51. April - Security in the Mobile Era

  52. March - Avoiding Online Tax Scams

  53. February - Protecting Against Cybercrime

  54. January - 2015 Cyber Security Outlook


  55. 2014

  56. December - Make Your List and Check it Twice: Follow these tips for securing your new computer or device.

  57. November - Online Holiday Shopping: Tips for Keeping Your Information Secure

  58. October - Trick or Treat... or Should We Say Trick or Threat

  59. September - Social Media Scams -- Spot Them Beforehand!

  60. August - Secure Online Banking

  61. July - Cyber Security and Your Summer Vacation

  62. June - Bots, Botnets, and Zombies

  63. May - Protecting Against Mobile Malware

  64. April - Hacked! Now What?

  65. March - Protect Yourself from Online Tax Scams

  66. February - Personal Backup and Recovery of Your Data

  67. January - 2014 Cyber Security Outlook


  68. 2013

  69. December - Cyber Hygiene with the Top 20 Critical Security Controls

  70. November - Cyber Monday and Online Shopping Season: What You Need to Know to Protect

  71. October - Take the CIS Cyber Security Pledge

  72. September - Social Networking Sites: Security and Privacy Issues

  73. August - Java Exploits

  74. July - Using Wi-Fi: Connect With Care

  75. June - Keeping Senior Citizens Safe Online

  76. May - Do You Know Where Your Personal Information Is?

  77. April - Protect Yourself from Email Phishing Attacks

  78. March - Protect Yourself from Email Tax Scams

  79. February - How Do I Protect the Information on My Smartphone?

  80. January - Emerging Trends and Threats for 2013


Security Awareness:

  1. Awareness of Back to School Scams


DDoS Attacks:

  1. Center for Information Security’s Guide to DDoS Attacks