
Protect yourself and your networks from the cyber threat.
Beware of the Dark Web.
Hunters are planning their attack to feed off your personal information.
STICK WITH YOUR FAMILIARS
Avoid unknown senders of emails asking you to click a link or download a file.
DON’T JUST INVITE JUST ANYONE IN
- Connect on social media with people you can verify.
- Attackers collect information to social engineer you into providing them access to your network.
- Validate any fund transfers or information requests that are emailed.
- What may look like an email from your CEO could be a
- Business Email Compromise (BEC) designed to fool you into giving
- valuable data to unauthorized parties. Call to confirm requests.
JUST ONE MISPLACED BYTE COULD DRAIN YOU
- Validate any fund transfers or information requests that are emailed.
- What may look like an email from your CEO could be a Business Email Compromise (BEC) designed to fool you into giving valuable data to unauthorized parties. Call to confirm requests.
