Employee Resources
IT Education
Social engineering is the process of gaining access to a system through the people who use it instead of attacking the system directly. For example, one form of social engineering may be an attacker researching information about a highly-privileged person — their favorite football team, their pet’s names, their date of birth, etc. — and trying those bits of info as a password.
PDFs are great for when you need to share official documents, but they can be more difficult to work with than other file formats when you need to edit or fill them out.
Most computer infections are caused by people downloading and running the virus themselves; i.e., being tricked. These infections come in all shapes and sizes.
Scammers can pressure office workers into “ordering” substandard, overpriced office supplies. Learn how to recognize these scams and how to protect yourself from them.
You have a strong password, but you still want more protection online. What else can you do? Experts agree, the next best thing is two factor authentication. But what exactly is two factor authentication (2FA)?
On Thursday, December 13, 2018, a wave of bomb threats were sent to various English-speaking countries around the world, including the U.S., via email. These threats were meant to cause disruption and/or obtain money.