Documents

In a world where it feels like we need passwords for everything, it can be easy to become a bit careless when creating them, Using obvious information, using the same password for multiple platforms and only varying passwords for different platforms by one character are...

Criminals are crafty. They use elaborate stories and false identities to gain trust and create money mules. A money mule is someone that criminals use to launder illegally obtained money. This can be done by using bank accounts, checks, money orders and or wire transfers. To...

Social media is a great way to stay in contact with friends and family members. You can share pictures, like and comment on statuses and even send private messages back and forth. However, you can't trust every profile you see. Keep an eye out for...

We’ve all seen those “Let’s Learn About You” social media posts with a long list of personal questions - asking about your life experiences, where you’ve lived and even your pets' names. While these may seem like fun little games to share more about you,...

With the internet, we are able to accomplish tasks more efficiently and conveniently from our homes. However, with technology, there are security risks which is why home network security is important. Home network security refers to the protection of a network that connects devices such as...

Scammers use email or text messages to trick you into giving them personal information. But, there are several things you can do to protect yourself. HOW TO RECOGNIZE PHISHING Scammers use email or text messages to trick people into giving them personal information. They may try to...