Documents

Due to school closings and stay-at-home orders resulting from the COVID-19 pandemic, children’s increased online presence may put them at greater risk of child exploitation. Parents, guardians, caregivers, and teachers can take the following measures to help protect kids online from becoming victims of online...

The range of current malicious activity attempting to exploit COVID-19 worldwide varies. A few common examples include: • Fake tests or cures. Individuals and businesses have been selling or marketing fake “cures” or “test kits” for COVID-19. These cures and test kits are unreliable, at best,...

While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know. What steps can you take to protect yourself and...

Did you receive a new device this Holiday Season? As impressive as the latest iPhone or gaming computer might be, ensuring you’re able to properly secure these devices is more important than ever! Any device that connects to the internet is potentially vulnerable and could...

Here are some tips to help you keep the scammers at bay and avoid scams during the novel coronavirus pandemic. • Hang up on robocalls. Don’t press any numbers. Scammers are using illegal robocalls to pitch everything from scam Coronavirus treatments to work-at-home schemes. The recording...

App stores offer millions of applications. In them, you’ll find everything from social media apps, tools, and games, to specific apps created by popular brands and corporations. Besides offering tons of high-quality apps, these stores are secure and offer the best and safest user experience....

Keep your debit card protected. Know the signs of a scammer. We are diligent in monitoring your debit card security. Below are a few things to keep in mind if we ever contact you regarding a transaction: You will receive a phone call from an agent who...

What is Caller ID Spoofing? Caller ID spoofing is the process of changing the caller ID to any number other than the calling number. When a phone receives a call, the caller ID is transmitted between the first and second ring of the phone. To transmit the caller ID,...