Fake DocuSign sites show a new phishing scam is happening with fake emails and sites. There is a strong demand for digital document management and electronic si...
New Online Hub Helps Victims Find Resources, Help for Ransomware Attacks According to Reuters, the U.S. Justice and Homeland Security departments debuted an onl...
CourseVector’s team of security experts receives scam emails almost daily. We know it is becoming more difficult to tell the difference between scams and legi...
Many of us are navigating the work-from-home / school-from-home landscape as the 2020 COVID-19 Pandemic presses on. It is important to maintain good virtual hyg...
Tips and tricks for online meeting success Zoom has been in the news for its capability to allow businesses, organizations, and families connect online, but als...
Shadow IT is defined as any IT services, not set up or documented by an oversight authority, usually an IT department. Every undocumented, and unmonitored, IT s...
“Is there anything in this post that I wouldn’t want a hacker to know?” Social media can be a fun way to connect with coworkers, promote our companies or ...
free cybersecurity poster about data encryption july 2019P2-Change-Default-PasswordsP3-Cyber-Security-PolicyCybersecurity is on the minds of everybody. Consumer...
With news media, sports teams, etc., all pushing how interesting FaceApp is, lots of people are using it. However, people are giving up much more personal data ...
Malware and web-based cyber attacks are growing in their number, complexity, and method of delivery. One wrong move and sensitive data or personally identifiabl...