You are here

Tip of the Week:

Hackers Can Take Control of a Computer and Use It for Their Own Purposes. Keep Your Computer Secured and Learn to Recognize the Signs of Infection.

A virus or malicious program may not directly damage your computer but may instead turn it into a zombie. A zombie computer is a computer that a hacker can direct to complete certain tasks, such as attacking another target. Always keep your computer secured with antivirus protection to avoid this and complete a full system scan if you suspect your computer has been compromised. A compromised computer may begin running sluggishly, start crashing or begin performing tasks on its own such as sending out emails through your email account.

 

What is Phishing?

According to the Federal Trade Commission, phishing is when “internet fraudsters impersonate a legitimate organization to trick you into giving out your personal information.”

Read More

What is Identity Theft?

Identity theft is a situation in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.

Read More

What is Password Management?

Your password protects you from unwanted access to your accounts. In combination with your userid, your password verifies who you are and also grants you access to protected resources.

Read More