Naughty or Nice? Here’s How to Tell If an E-Commerce Website is Legit

We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do you really know if that online shopping website is just selling you a bag of coal? According to Forbes, retailers are projecting that online fraud attempts will increase 43 percent this year alone, and is projecting to peak on Christmas Eve–accounting for 2.5 percent of all fraud for the year. 

Online shopping fraud continues to increase not only because scammers continue to improve the look and feel of their fake websites, but they’re also using legitimate methods to reach new potential victims, including email, text messages, and Facebook advertising. Luckily, there are a few telltale signs you can look for while online shopping to distinguish authentic e-commerce sites from the fake. Before entering any personal or payment information into an online shopping site, ask yourself these important questions:Continue Reading →

Fall Back & Get Ahead for Daylight Savings Time

Daylight Savings Safety

Daylight Saving Time ends on November 6, and we’ll all turn back our clocks an hour–or let our smartphones do it for us.

Daylight Savings serves a great reminder to make small beneficial changes that will give you peace of mind all year long. We’ve put together this quick list and graphic with the five things you should check and change along with your clocks as we fall back to Standard Time.  

Continue Reading →

Password Managers are a Top Cyber Security Tool for Critical Infrastructure Systems

password managers for critical infrastructure systems

A cyber security researcher on a jet hacks into flight controls via its in-flight information system.

A practical joker cracks the code for programming electronic highway road signs.

An organized crime group hides drugs in an ocean shipper’s legitimate cargo and uses hackers to gain data needed to steal the cargo containers in port.  

A cybercriminal gains access to a railroad’s signaling system by pretending to be a rail company executive and sending out bogus emails to other employees.

Each of these scenarios demonstrates what happens when a cybersecurity vulnerability common in transportation and other critical infrastructure systems is discovered and abused: a weak password. The first three actually occurred; the fourth is a terrifying possibility. 

Continue Reading →