Information Technology Services

Phishing is their game, using fake emails, social media posts, or direct messages to lure you into clicking slimy links, coughing up sensitive info, or downloading dodgy attachments with the promise of juicy catches. If you take the bait and click the deceitful link, you might find your personal information swimming in treacherous waters.  Spot [Read More]

Make it automatic. Most reputable software companies offer the convenience of automatic updates for their products, with reminders when updates are available. If automatic updates aren’t available, set a quarterly reminder to manually check for updates. Get it from the source. When downloading a software update, ensure it’s from the official company that created it. [Read More]

Create strong, memorable passwords by using lengthy and complex passphrases. Passwords should be:  Long – Ensure every password is a minimum of 14 characters long. Unique – Never reuse passwords across different accounts. That way if one account is compromised, the others remain secure.  Complex – Create each unique password using a mix of uppercase [Read More]

CHECK YOUR PRIVACY SETTINGS Sally knows that oversharing on social media can have long-term consequences. She double-checks her privacy settings for her internet accounts monthly. Sally un-tags herself from photos where multiple people are tagged because she read that, if others in the photo have loose privacy settings, her privacy can be compromised as well. [Read More]