Curated Insights

Cybersecurity

News and information to help improve your Four Capitals
the approach
Cybersecurity

Credit Freeze, Lock, or Fraud Alert: What are the Differences?

If you’re a little worried about your credit report and identity theft in the midst of recent data breaches, we don’t blame you! The good news is there are several ways you can protect yourself and your hard-earned credit score. One action you can take is to freeze, lock, or put a fraud alert on your credit — but what are the differences amongst the 3 options?

Posted By Schultz Financial Group Inc.
June 18, 2018
Cybersecurity

How to Respond to a Data Breach

Time is of the essence, whether your personal data has been compromised as part of a larger targeted cyberattack, or you are the victim of an individual cybercrime. You’ll need to take immediate action to minimize the impacts. Here are steps you should consider taking within specified timeframes after discovering your data has been breached.

Posted By Jennifer Specter
May 18, 2018
Cybersecurity

Cybersecurity Best Practices

Cybercrime and fraud continue to be serious threats, and constant vigilance is key. Following best practices and exercising caution when sharing information or executing transactions can help make a big difference.

Posted By Jennifer Specter
April 4, 2018
Cybersecurity

Connected Cars: Convenience vs. Security

As the Internet of Things (IoT) continues to grow, cars, appliances, watches, and phones will more frequently communicate directly with each other without a person initiating the message. Learn more about cybersecurity risks in connected cars.

Posted By Jennifer Specter
February 8, 2018
Cybersecurity

Staying Secure on the Internet of Things

The expanding Internet of Things (IoT) is defined as “The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.” While this sounds like we are living in the future, most of us in fact use the IoT without even thinking about it. Read this article to find out how to use these great advances while safeguarding your data, your family and yourself.

Posted By Jennifer Specter
January 7, 2018