Lessons Learned: Electrical Coop Cyberattack

Lessons Learned: Electric coop cyberattack - it took 17 minutes from entry to encryption of systems and ransom

When we think of cyberattacks on electrical coops, we think of taking down our electrical grid. Operational technologies are modernized for efficiency and safety, but your electrical coop’s greater cyberthreat is what plaques other industries and businesses – data theft, fraud, ransomware. Is your IT side keeping up with the criminal’s strategies? In a recent […]

5 Ways to Stop Cyberbullying

While the internet provides endless opportunities for learning, socializing, and self-expression, it also exposes students to various risks. And cyberbullying is one of the most prevalent risks present.  Have you seen signs your child is being cyberbullied? As parents or adults with children in our lives, it is our responsibility to create a safe online […]

5 Signs a Child is Being Cyberbullied

While the internet provides endless opportunities for learning, socializing, and self-expression, it also exposes students to various risks. And cyberbullying is one of the most prevalent risks present.  As parents or adults with children in our lives, it is our responsibility to create a safe online environment for our children and equip them with the […]

Back-to-School Cybersecurity: A Guide for Parents

Stack of books next to title Back To School Cybersecurity A Guide for Parents

As another school year approaches, it’s essential for parents to not only focus on buying school supplies and organizing schedules but also on safeguarding their children’s online activities. Cybersecurity is an ongoing concern, and students can be particularly vulnerable to the risks online. Take proactive steps to educate and protect your student’s online presence, so […]

What is a Disaster Recovery Plan? Here’s What to Know

8 Elements of a Business Impact Analysis (BIA) for Compliance

Business owners should be thinking about disaster recovery for work continuity. Every business owner should have reliable backups for their business. A DRP (disaster recovery plan) should be in place for your business. Learn what a DRP is and how you can formulate one. What is a DRP? A DRP for your business is a […]

How to Spot a Phishing Email

people looking at a computer learning how to spot a phishing email

First, you must train yourself to spot the signs of a phishing email. Second, you must practice. Then, you can protect yourself and your company. STOP and ask yourself, am I expecting this email? When you are in a rush or on a phone email app, STOP and ask yourself, can this wait until later […]

How Does Ransomware Work?

cyber security policy

Ransomware is a major problem for companies around the globe. Did you know businesses lose about $8,500 per hour because of ransomware-induced downtime, according to Comparitech? The CISA reports that, even though agencies and governments remain vigilant to uphold data security, malicious actors continue to reinvent their ransomware tactics. According to KPMG, the Covid- 19 […]

What is a Password Manager?

Let password managers remember

Today, nearly every adult and child has at least one password. Most have nearly 100! The statistics around password management are rather grim. The most commonly strategy is writing them down in a notebook (31%). Remembering passwords is also a popular technique reported by 26% of the participants. (NCA). The most startling stat is only […]

How to Use a Password Manager

Using a password manager will save you time, protect you and keep you more secure

First select a Password Manager – this blog shares some options. This example is using 1Password, but it’s a very similar process with all of them. It will show you the basics of how to use any password manager. You will need to download the application for your phone and your computer. You will also […]

Gone Phishing: 4 Ways to Protect Yourself from Scams

Have you been surfing through a website or emails and had a message calling you to reveal personal information such as credit card numbers or passwords? You may have been subject to phishing. Phishing is an attack in which scammers pretend to be legitimate websites to collect personal information. Cybercriminals also use phishing to deliver […]