top of page

RESOURCES

Christian Cybersecurity program

60 Minutes Interview - Federal Reserve Chair Jerome Powell

March 11, 2019

Arguably the second most powerful position after the President - listen to what he has to say starting 10 minutes into the interview (at least 3 important issues) if you do not have time for this 13 minutes interview - think about its implications.... -

Disposing of Your Mobile Device

From Ouch,

Overview,

Mobile devices, such as smartphones, smart watches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as frequently as every year. Unfortunately, people often do not realize how much personal data is on these devices. Below we cover what may be on your mobile device and how you should securely wipe it before disposing of it. If your mobile device was issued to you by your employer, or has any work data stored on it, be sure to check with your supervisor about proper backup and disposal procedures first.....

Click here for the newsletter.

Personalized Scams

From Ouch,

Overview,

Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them..

Click here for the newsletter.

Search Yourself Online

From Ouch,

Overview,

You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to research yourself and discover what information is publicly known about you. The process is called OSINT, a fancy way of saying Open Source Intelligence.

Click here for the newsletter.

How to be 'Safe'/Invisible on the Internet

Practical how to tutorial - easy to follow and definitely worth your time to implement these measures to improve your privacy and security in cyberspace.

Yes, You Are a Target

From Ouch,

Overview,

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use technology in anyway, at work or at home, trust us - you have value to the bad guys. But, you are in luck. You already have the best defense there is against these cyber attacks - you..

Click here for the newsletter.

Am I Hacked?

From Ouch,

Overview,

Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do.

Click here for the newsletter.

Cybersecurity Trends - 2018 by CB Insights

October 15, 2018

From CB Insights,

There is a free sign-up to receive their content - https://www.cbinsights.com/research/cybersecurity/

Click here for the report

Email Oops, and How to Avoid Them

October 1, 2018

From Ouch,

Overview

Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common mistakes people make with email and how to avoid them.

Click here for the newsletter.

National Cyber Strategy of the United States of America

September 20, 2018

From President Trump,

My fellow Americans:

Protecting America’s national security and promoting the prosperity of the American people

are my top priorities. Ensuring the security of cyberspace is fundamental to both endeavors.

Cyberspace is an integral component of all facets of American life, including our economy and

defense. Yet, our private and public entities still struggle to secure their systems, and adversaries

have increased the frequency and sophistication of their malicious cyber activities.

America created the Internet and shared it with the world. Now, we must make sure to secure

and preserve cyberspace for future generations.....

Click here for the report.

CEO Fraud/BEC

September 1, 2018

From Ouch,

Overview

What is CEO Fraud/BEC?

 

Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should not take. In most cases, the bad guys are after money. What makes these attacks so dangerous is cyber attackers research....

Click here for the newsletter.

Smart Home Devices

August 1, 2018

From Ouch,

Overview

What are Smart Home Devices?

 

Traditionally only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However today, more and more devices are connecting to the Internet, from your lightbulbs and speakers to your TV, locks on your door or even your car. Soon, almost every device in your house could be connected to the Internet. These connected devices often go by the name of Internet of Things (IoT) or Smart Home devices. While these connected devices bring a great deal of convenience, they also bring unique dangers.

 

Click here for the newsletter.

Public Safety Announcemnt - Are You a Victim of Equifax September 2017 Massive Cybersecurity Breach?

July 28, 2018

This is a legitimate website to check if your records were compromised as a result of Equifax September 2017 cybersecurity breach. Please take the appropriate next steps as recommended by Equifax - cleaning up a credit history is messy and time-consuming, not to mention its impact on your financial health and privacy.  

Phone Call Attacks & Scams

July 1, 2018

From Ouch,

Overview
When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals do use technologies like email or instant messaging, bad guys are also using the phone to trick their victims. There are two big advantages to using a phone. First, unlike email, there are fewer security technologies that monitor phone calls and can detect and stop an attack. Second, it is much easier for bad guys to convey emotion over the phone, which makes it more likely they can trick their victims. Let’s learn how to spot and stop these attacks.

 

Click here for the newsletter.

Stop That Walware

June 1, 2018

From Ouch,

"Overview

You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber criminals use to infect computers and devices. Once installed, they can do whatever they want. Learn what malware is, what danger it poses, and most importantly, what you can do to protect yourself from it....."

 

Click here for the newsletter.

What is GDPR?

May 1, 2018

From Ouch,

"Overview

You may have heard of a new law called GDPR, or the General Data Protection Regulation. This law was developed by the European Union and takes effect 25 May 2018. It applies to any organization that handles the personal information of any resident in the European Union (EU), regardless of where in the world that organization is located. GDPR requires organizations to maintain the privacy and security of any EU resident’s personal information. To ensure compliance with GDPR, some key principles need to be understood and implemented...."

 

Click here for the newsletter.

Stop That Phish

April 1, 2018

From Ouch,

"Overview

Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in touch with friends and family. Since so many people around the world depend on these technologies, they have become one of the primary attack methods used by cyber attackers....." 

 

Click here for the newsletter.

Top Tips to Securely Use Socal Media

March 1, 2018

From Ouch,

"Overview

Social media sites Facebook, Snapchat, Twitter, Instagram and LinkedIn are amazing resources allowing you to meet, interact and share with people around the world. However, with all this power comes risks - not just for you, but your family, friends, and employer. In this newsletter, we cover the key steps to making the most of social media securely and safely."

 

Click here for the newsletter.

Securing Your Mobile Devices

February 1, 2018

From Ouch,

"Overview

Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities.  Since your devices are such an important part of your life, here are some simple steps to keep you and your devices safe and secure. ...."

 

Click here for the newsletter.

Creating a Cybersecure Home

Jan 1, 2018

From Ouch,

"Overview

Several years ago, creating a cybersecure home was simple, most homes consisted nothing more than a wireless network and several computers. Today, technology has become more complex and is integrated into every part of our lives, from mobile devices and gaming consoles to your home thermostat and your refrigerator...."

 

Click here for the newsletter.

Lock Down Your Login

Dec 1, 2017

From Ouch,

"Overview

The process of authentication, or proving who you are, is key to protecting your information, such as your email, social media or online banking accounts. You may not realize it but there are three different ways to prove who you are...."

 

Click here for the newsletter.

Shopping Online Securely

Nov 1, 2017

From Ouch,

"Overview

The holiday season is nearing for many of us, and soon millions of people around the world will be looking to buy the perfects gifts, Many of us will choose to shop online in search of great details and to avoid long lines and impatient crowds. Unfortunately...."

 

Click here for the newsletter.

Helping Others Secure Themselves

Oct 1, 2017

From Ouch,

"Overview

Many of us feel comfortable with technology, to include how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused, intimated, or even scared by it. This makes them very vulnerable to today's cyber attackers. Cybersecurity does not have to be scary; its actually quite simple once you understand the basics. They most likely just need a you to help them understand the bascics...."

 

Click here for the newsletter.

Password Managers

Sept 1, 2017

From Ouch,

"Overview

One of the most important steps you can take to protect yourself online is to use a unique, strong password for each of your accounts. Unfortunately, most of us have so many accounts that it’s almost impossible to remember all of our passwords. A simple solution is to use a password manager, sometimes called a password vault. These applications are designed to securely store your login credentials. Moreover, they can make it much easier for...."

 

Click here for the newsletter.

Backup and Recovery

August 1, 2017

From Ouch,

"Overview

If you use a computer and mobile device long enough, sooner or later, something will go wrong..."

 

Click here for the newsletter.

Gaming Online Safely & Securely

July 1, 2017

From Ouch,

"Overview

Online gaming is a great way to have fun; however it also comes with its own set of unique risks. In this newsletter, we cover what you can do to protect yourself .and your family when gaming online..."

 

Click here for the newsletter.

Lessons from WannaCry

June 1, 2017

From Ouch,

Recently, you most likely watched widespread news coverage of a new cyber attack call WannaCry. It infected over 200,00 computers worldwide and locked numerous organizations out of their data, including hospitals in the United Kingdom. 

Click here for the newsletter.

Securing Today’s Online Kids

May 1, 2017

From Ouch,

The number of ways children today can go online and interact with others is staggering. From new social media apps and games to schools issuing Chromebooks, kids’ social lives and futures depend on their ability to make the most of technology. As parents, we want to make sure they do so in a safe and secure manner. However, this can be a challenge, as many of us never grew up in a technical environment like this. To help you, we cover the key steps to enabling today’s kids to make the most of technology safely and securely.
 

Click here for the newsletter.

Passphrases

April 1, 2017

From Ouch,

"Background

Passwords are something you use everyday, from accessing your email to banking online to purchasing goods or accessing your smartphone. However, passwords are also one of your weakest point; if someone learns or guesses your password, they can access your accounts as you, allowing them to transfer money, read your emails, or steal your identity..."

 

Click here for the newsletter.

Securely Using Mobile Apps

March 1, 2017

From Ouch,

"Overview

Mobile devices, such as tablets and smartphones have become one of the primary technologies we use in both our personal and professional lives. What makes mobile devices so versatile are the millions of apps we can choose from. These apps enable us to be more productive, instantly communicate and share .with others, train and educate or just have more fun However, with the power of all these mobile apps come risks. Here are some steps you can take to securely use .and maintain your mobile apps..."

 

Click here for the newsletter.

Staying Secure on the Road

February 1, 2017

From Ouch

Overview
We want you to be able to make the most of technology at all times, including when you travel. In this newsletter, we cover how you can connect to the Internet and use your devices securely on the road.

Click here for the newsletter.

Social Engineering

January 1, 2017

From Ouch

Overview
A common misconception among most people have on cyber attacks....

Click here for the newsletter.

Securely Disposing of Your Mobile Device

December 1, 2016

From Ouch

Overview
Mobile devices such as smartphones, smartwatches, and tablets, continue to advance and innovate at an astonishing rate......

Click here for the newsletter.

Cyber Seek - Heat Map for Cybersecurity Jobs in the USA

November 1, 2016

From Cyber Seek

Cybersecurity talent gaps exist across the country. Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. This interactive heat map provides a granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels, and can be used to grasp the challenges and opportunities facing your local cybersecurity workforce.

Using the Clould Securely

November 1, 2016

From Ouch

Overview
“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored. Examples of Cloud computing include creating documents on Google Docs, sharing files via Dropbox, setting up your own server on Amazon Cloud, storing customer data in Salesforce, or archiving your music or pictures on Apple’s iCloud. These online services can make you far more productive, but they also come with unique risks. In this newsletter, we cover how you can securely make the most of the Cloud.

Click here for the newsletter.

Four Steps to Staying Secure

October 1, 2016

From Ouch

Overview

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using or where you are using it, we recommend the following four key steps. To learn more about any of the steps below, refer to the Resources section at the end of this newsletter.

 

Click here for the newsletter.

Emails Do's and Don'ts

September 1, 2016

From Ouch

Emails Do's and Don'ts

Email is still one of the primary ways we communicate, both in our personal and professional lives However, we can often be our own worst enemy when using email.  In this newsletter, we will explain the most important mistakes people make with email and how you can avoid them in your day-to-day lives.

 

Click here for the newsletter.

Ransomware

August 1, 2016

From Ouch

What is Ransomware

Ransomware is a special type of malware that is actively spreading across the internet today, threatening to destroy victim's documents and other files. Malware is a software - a computer program - used to perform malicious actions. While ransomware is just one of many different types of malware, it has become very common because it is so profitable for criminals.

 

Click here for the newsletter.

CEO Fraud

July 1, 2016

From Ouch

What is CEO Fraud?

Cyber criminals are sneaky - they are constantly coming up with new ways to get what they want. One of their most effective methods is to target someone like you. While cyber attackers have learned that unaware people are the weakest link in any organization, they have forgotten that knowledgeable people like OUCH! readers can be thw organization best defense.

 

Click here for the newsletter.

Encryption

June 1, 2016

From Ouch

Encryption

You may hear people use the term “encryption” and how you should use it to protect yourself and your information. However, encryption can be confusing and you should understand its limitations. In this newsletter, we explain in simple terms what encryption is, how it protects you, and how to implement it properly.

 

Click here for the newsletter.

Internet of Things (IoT)

May 1, 2016

From Ouch

Overview

"What Is the Internet of Things (IoT)

In the past, technology was relatively simple; you just connected your computer to the Internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges. The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the Internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues. In this newsletter, we help you understand what those risks are and what you can do to secure your IoT devices, your home, and your family."

 

Click here for the newsletter.

I'm Hacked, Now What?

April 1, 2016

From Ouch

Overview

"We know you care about protecting your computer .and mobile devices and take steps to secure them. However, no matter how securely you use technology you may eventually be hacked or “compromised.” In this newsletter, you will learn how to determine if your ,computer or mobile device has been hacked and, if so what you can do about it. Ultimately, the quicker you ,detect something is wrong and the faster you respond .the more likely you can reduce the harm a cyber attacker can cause..."

 

Click here for the newsletter.

USSCOM Commander's Reading List 2016

March 29, 2016

This year's list USSOCOM Commander's List - also note 2015 and 2014.

What is Malware?

March 1, 2016

From Ouch

"Overview

You may have heard of terms such as virus, trojan ransomware, or rootkit when people discuss cyber ,security. All of these words describe the same thing types of programs used by criminals to infect computers and devices. A common term used to describe all these different programs is the word malware. In this newsletter, we will explain what malware is, who creates .it and why, and most importantly, what you can to do protect yourself against it"

 

Click here for the newsletter

Password Managers

October 1, 2015

From Ouch,

"Overview

One of the most important steps you can take to protect yourself online is to use a unique, strong password for each of your accounts. Unfortunately, most of us have so many accounts that it’s almost impossible to remember all of our passwords. A simple solution is to use a password manager, sometimes called a password vault. These applications are designed to securely store your login credentials. Moreover, they can make it much easier for...."

 

Click here for the newsletter.

Free Cybersecurity Course

February 29, 2016

Take this free course to be a Cyber Ace!

 

SANS Cyber Aces Online is an online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorials, videos, and quizzes. It’s available as open courseware so you can take it anytime. SANS is donating the course from their library of professional development curriculum. And it’s free.

 

 

Securing the Home Network

February 1, 2016

From Ouch,

"Overview

Several years ago, home networks were relatively simple They were usually nothing more than a wireless access ,point and computer or two used for surfing the Internet online shopping, or gaming. However, home networks have become increasingly complex. We now connect far more devices to these networks and use them for more than just web browsing or consuming media. In .this newsletter, we cover how you can create a secure network at home for you and your family..."

 

Click here for trhe newsletter.

Securing Your New Tablet

January 1, 2016

From Ouch,

"Overview

Congratulations on your new tablet! This technology is a ,powerful and convenient way to communicate with others shop online, watch movies, play games and perform a myriad of other activities. Since your tablet will most likely become an important part of your life, even perhaps replacing your computer, here are some key steps you should take to keep .your tablet and your information safe and secure..."

 

Click here for the newsletter.

 

 

 

 

 

 

 

 

 

Phishing

December 1, 2015

From Ouch

"Overview

Email is one of the primary ways we communicate. We not only use it every day for work, but to stay in touch with our friends and family. In addition, email is now how most companies provide online services, such as confirmation of .your online purchase or availability of your bank statements ,Since so many people around the world depend on email it has become one of the primary attack methods used by cyber criminals. In this newsletter, we explain phishing, a common email attack method, and the steps you can take to use .email safely..."

 

Click here for the newsletter.

Shopping Online Securely

November 1 2015

From Ouch

"Overview

Tis the Season to Be Cautious’ The holiday season is close upon us and soon millions of people around the world will be looking to buy the perfect gifts. Many of us will choose to shop online in search of .a great deal and avoid long lines and impatient crowds Unfortunately, this is also a criminal’s favorite time of the year to commit online or financial fraud. This month, we explain the dangers of shopping online and ways you can .

Click here for the newsletter.

Two-Step Verification

September 1, 2015

From Ouch,

"Overview

The process of proving who you are (called authentication is key to protecting your information. Strong authentication ,attempts to ensure only you can access your information .such as your email, your photos or your bank accounts :There are three different ways to confirm who you are what you know (such as a password), what you have such as your driver’s license) and what you are (such) as your fingerprint). Each one of these methods has advantages and disadvantages. The most common method is passwords, which are something you know. In this newsletter, we are going to teach you how to protect yourself with two-step verification, something far more secure than just passwords and yet very simple to use. To better understand .two-step verification, we need to start with passwords first..."

 

Click here for the newsletter.

Backup and Recovery

August 1, 2015

From Ouch,

"Overview

Sooner or later, you most likely will have something go wrong and lose your personal files, documents or photos. Examples include accidently deleting the wrong files, hardware failure, losing your laptop or infecting your computer. At times like these, backups are often the only ,way you can rebuild your digital life. In this newsletter we explain what backups are, how to back up your data .and develop a strategy that’s right for you..."

 

Click here for the newsletter.

Social Media

July 1, 2015

From Ouch,

"Overview

Social media sites, such as Facebook, Twitter, Instagram and LinkedIn, are amazing resources, allowing you to .meet, interact and share with people around the world However, all this power also brings risk for you, your family, friends and employer. In this newsletter, we explain what these dangers are and how to use these .sites securely and safely..."

 

Click here for the newsletter.

Educating Kids on Cyber Safety

June 1, 2015

From Ouch,

"Background

The number of ways children today can go online and interact with others is staggering. New social media services pop up like weeds and there are an everincreasing number of apps and games that connect online. In addition, many schools are migrating to services such as Google Drive and require work to be completed and submitted online. Kids are literally growing up “connected.” While this has many benefits, these opportunities also come with risks. In this newsletter, we .explore three areas of risk for kids and what you can do to help them stay safe..."

 

Click here for the newsletter.

Securing the Cyber Generation Gap

May 1, 2015

From Ouch,

"Overview

Many of us feel comfortable with technology, to include how to use it safely and securely. However, other family ,members may not feel so comfortable with technology especially if they did not grow up with computers or the Internet. Here are some steps you can take to help secure the generation gap. In addition, you may be taking steps to secure your children at home, but similar security measures may not exist when your kids visit a relative’s house. As such, we will also cover how you can .help create more secure online environments when your kids visit these relatives..."

 

Click here for th newsletter.

Passphrases

April 1, 2015

From Ouch,

Background

"Passwords are something you use almost every day from accessing your email and banking online to .purchasing goods or accessing your smartphone However, passwords are also one of your weakest points; if someone learns your password, they can steal your identity, transfer your money or access your personal information. Strong passwords are essential to protecting yourself. In this newsletter, you will learn how to create strong passwords that are easy to remember .by using a type of password called passphrases..."

 

Click here for the newsletter.

Gaming Online Safely & Securely

March 1, 2015

From Ouch,

"Overview

Online gaming is a great way to have fun; however it also comes with its own set of unique risks. In this newsletter, we cover what you can do to protect yourself .and your family when gaming online..."

 

Click here for the newsletter.

Staying Secure on the Road

February 1, 2015

From Ouch,

"Overview

In this newsletter, we will cover how you can securely connect to the Internet and get things done .while traveling..."

 

Click here for the newsletter.

Securely Using Mobile Apps

January 1, 2015

From Ouch,

"Overview

Mobile devices, such as tablets and smartphones have become one of the primary technologies we use in both our personal and professional lives. What makes mobile devices so versatile are the millions of apps we can choose from. These apps enable us to be more productive, instantly communicate and share .with others, train and educate or just have more fun However, with the power of all these mobile apps come risks. Here are some steps you can take to securely use .and maintain your mobile apps..."

 

Click here for the newsletter.

What is Anti-Virus?

December 1 2014

From Ouch,

"Overview

Anti-virus is a security program you install on your computer or mobile device to protect it from getting infected by malware. The term “malware” is a catch-all phrase for ,any type of malicious software, such as viruses, worms Trojans and spyware. In fact, the term malware comes from combining the words malicious and software. If your computer has become infected by malware, a cyber attacker can capture all of your keystrokes, steal your documents or use your computer to attack others. Contrary to what some people believe, any operating system, including Mac OS X and .Linux, can be infected..."

 

Click here for the newsletter.

Social Engineering

November 1 2014

From Ouch,

"Overview

A common misconception people have about cyber attackers is that they only use advanced hacking tools and technology to break into people’s computers, accounts and mobile devices. This is simply not true. Cyber attackers have learned that one of the easiest ways to steal your information or hack your computer is by simply talking to and misleading you. In this newsletter, we will learn how these types of human attacks (called social engineering .attacks) work and what you can do to protect yourself..."

 

Click here for the newsletter.

Five Steps to Staying Secure

October 1 2014

From Ouch,

"Overview

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance ,on what you should or should not be doing. However while the details of how to stay secure may change over time, there are fundamental things you can always do to help protect yourself. Regardless of what technology .you are using or where you are using it, we recommend the following five key steps..."

 

Click here for the newsletter.

Using the Cloud Securely

September 1, 2014

From Ouch,

"Overview

The Cloud” is a powerful technology that both people” and organizations are rapidly adopting. “Cloud” can mean different things to different people, but it generally means using a service provider on the Internet to store and manage your data for you. An advantage of the Cloud is not only can you easily access and synchronize ,your data from multiple devices anywhere in the world but you can also share your information with anyone you want. The reason we call these services “The Cloud” is you often do not know where your data is physically stored. Examples of Cloud computing include creating documents on Google Docs, sharing files via Dropbox, setting up your own server on Amazon Cloud or storing your music or pictures on Apple’s iCloud. These online services have the potential to make you far more productive, but they also come with unique risks. In this newsletter, we cover how you can securely leverage the Cloud..."

 

Click here for the newsletter.

Encryption

August 1 2014

From Ouch,

"What Is Encryption You may hear people use the term “encryption” and how .you should use it to protect yourself and your information .However, the concept of encryption can seem confusing ;In addition, encryption cannot protect you from everything it has its limitations. In this newsletter, we explain in very simple terms what encryption is, why you should use it .and how to implement it properly..."

 

Click here for the newsletter.

Email Do’s and Don’ts

July 1 2014

From Ouch,

"Overview

Email has become one of the primary ways we .communicate in our personal and professional lives However, we can often be our own worst enemy when using it. In this newsletter, we will explain the most common mistakes people make and how you can avoid .them in your day-to-day lives..."

 

Click here for the newsletter.

Disposing of Your Mobile Device

June 1 2014

From Ouch,

"Overview

Mobile devices, such as smartphones and tablets, continue ,to advance and innovate at an astonishing rate. As a result many of us replace our mobile devices as often as every 18 months. Unfortunately, too many people simply dispose of their older mobile devices with little thought on just how much personal data their devices have accumulated. In this newsletter we will cover what types of personal information may be on your mobile device and how you can securely wipe it before disposing of it or returning it. If your mobile device was issued to you by your employer or has any organizational data stored on it, be sure to check with your supervisor about proper backup and disposal procedures before following the .steps below..."

 

Click here for the newsletter.

I'm Hacked, Now What?

May 1 2014

From Ouch,

"Overview

We know you are concerned about protecting your .computer and information and take steps to secure them However— just like driving a car —no matter how safely .you drive, sooner or later you may have an incident In this newsletter we will teach you what to look for to determine if your computer is hacked, and if so what you can do about it. Ultimately, the quicker you detect your ,computer has been hacked and the faster you respond .the better you can mitigate any harm to you or your organization..."

 

Click here for the newsletter.

Yes, You Actually Are A Target

April 1 2014

From Ouch,

"Overview

A common misconception many people have is that they are not a target for cyber crime: that they or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile ,device, an online account, email address, credit card or engage in other type of online activity, you are worth money to cyber criminals. In this newsletter we explain why you are a target, how you are being attacked, and.what you can do to protect yourself..."

 

Click here for the newsletter.

The End of Windows XP

March 1 2014

From Ouch,

"Overview

Windows XP has proven to be one of the most popular operating systems in computing history, at one point it was used on most of the computers around the world. However Windows XP is old, and all support for it from Microsoft will soon end. First released more than twelve years ago, Microsoft is scheduled to End of Life (EOL) Windows XP on April 8, 2014. This means Microsoft will no longer release any end-user updates or security patches. With approximately 25% of the world’s desktop computers still running Windows XP (only Windows 7 is more popular), millions of people will be at greater risk once this happens. Keep in mind, home users are not the only ones who will be impacted as XP is still widely used in offices, industrial control systems, ATM machines, medical systems, point-of-sale terminals, and other devices. Below we describe what the risks are once Windows XP is no longer supported .and steps you can take to protect yourself..."

 

Click here for the newsletter.

What is Malware

February 2014

From Ouch,

"Overview

You may have heard of terms such as virus, worm .trojan or rootkit when people discuss cyber security These terms describe types of programs used by cyber criminals to infect and take over computers and mobile devices. Today all of these different terms are now simply called malware. In this newsletter we will explain what malware is, who is developing it, why, and what you .can to do protect yourself against it..."

 

Click here for the newsletter.

Securing Your Home Network

January 1 2014

From Ouch,

"Overview

Home networks were relatively simple several years ago,, perhaps nothing more than a wireless access point and a computer or two used to surf the Internet or play games online. However, home networks have become increasingly complex. Not only are we connecting more devices to our home networks, but we are doing more things with them. In this edition we will cover some .basic steps to creating a more secure home network..."

 

Click here for the newsletter.

Please reload

bottom of page