Tips to Keep You Safe

Follow these best practices to keep your information and money safe.


Create a strong password using the following tips:


Whether using Windows, iOS (Apple) or Linux as your operating system, follow these tips to secure the device you use to surf the Internet:

HOW TO RECOGNIZE A SCAM: Phishing, SMShing & Vishing…

Phishing involves an email, often using the name and logo of a legitimate company, asking you to click a link and provide account details – which are then used to commit fraud. SMShing is essentially phishing via text, directing you to follow a link or call to provide sensitive account information. Vishing is phishing via phone, where the caller (or recording) warns you of the urgent need to confirm sensitive account information, or to call a number and provide it.

In order to avoid becoming a victim of a phishing, smshing or vishing scam, you need to know what to look for:

KEEP AWAY FROM MALWARE: Spyware, Ransomware, Trojan, Keyloggers…

Malware is the generic name given to malicious code that is designed to disrupt the normal operation of or cause harm to a user’s computer, phone, tablet, or other device. There is a wide range of different malware categories, including but not limited to worms, trojans, spyware, and keyloggers. These terms are often used interchangeably.

The vast majority of today's malware is focused on making money for the malware authors. This is typically done by stealing confidential data such as usernames, passwords, credit card details, or other financial particulars. This sensitive information is then used to launch further attacks on individuals and businesses or is sold to other malicious actors. Ransomware, a type of malware that locks a device and requires payment to regain access to files, is increasingly being used to monetize malware.

The following tips can help reduce the potential release of malware into your computer or network:


Follow these tips to protect your home wireless network as well as accessing wireless networks when traveling: