-
Don't Let Cybercriminals Swipe Your Savings
Lock Down Your Financial Accounts
Emily was having a typical busy Tuesday. She grabbed her morning coffee, glanced at her phone, and noticed a text from her bank: "Did you make this transaction? Reply YES or NO." She frowned. She hadn't made any purchases yet that day. Maybe it was just a glitch.
Download PDF -
Download Danger: How to Outwit Malicious Mobile Apps
One lazy Sunday while on social media, Sarah stumbled upon an ad for a new photo editing app, 'PiksPerfect.' Intrigued by its stunning filters, she downloaded it without hesitation. At first, the app worked great, but soon her phone became sluggish, and random ads began popping up. A few days later, Sarah received a call from her bank about suspicious transactions totaling thousands of dollars. In a panic, she checked her bank app and found her savings nearly wiped out. After reporting the fr
Download PDF -
Budgeting 101 for College Students
With my youngest son in college, I appreciated Karen Ramola’s article last month with financial tips and tools for parents and their college students. It is a good reminder your community banker can be a resource for more than your everyday banking transactions.
Read More -
Phantom Voices: Defend Against Voice Cloning Attacks
Margaret, a retired teacher, enjoyed her peaceful mornings in her small suburban home. One day as she was enjoying her morning coffee, she received a frantic call from her grandson, Jacob, who was away at college. His voice was filled with panic as he explained that he had been in a car accident and needed money urgently to pay for the damages and avoid legal trouble. If he did not get the money right away, he could end up in jail. The voice on the other end was unmistakably Jacob's - Margaret's
Download PDF -
Managing and Monitoring College Students’ Finances from Afar
College is a time for kids to spread their wings and gain independence. Meanwhile, parents struggle to balance kids’ desire for autonomy with the potential pitfalls if they unknowingly taking that freedom a bit too far.
-
Guard Your Heart (and Wallet) Against Romance Scams
Sarah was a kind, intelligent accountant nearing retirement. Widowed for several years, she felt a pang of loneliness that online dating profiles promised to soothe. Scrolling through pictures, she stumbled upon David, a charming architect supposedly working abroad. Their messages blossomed into daily conversations. David showered Sarah with compliments, his words painting a picture of a soulmate yearning for connection. Weeks turned into months, filled with virtual dates and shared dreams. Sara
Download PDF -
Text Messaging Attacks: A Smishing Saga
Mark was perplexed by the text message, a package delivery notification from Amazon - "Delivery attempt missed! Click the link now to reschedule or your package will be returned." Mark could not remember ordering anything online recently, but to be honest, he ordered so many things online it was easy to forget. Not wanting to miss any packages, he clicked the link, and a page loaded asking for his contact information "to ensure proper rescheduling." The message seemed a bit odd, but Mark figured
Download PDF -
Going on Vacation? Simple Steps to Make it Cypersecure
The summer season is upon us, and soon millions of people will be traveling all over the world. If you are going on vacation, here are some travel tips to help keep you cyber savvy and safe.
Download PDF -
Top Three Ways Cyber Attackers Target You
Social engineering attacks, in which adversaries trick people into doing something they shouldn’t, are one of the most common methods that cyber attackers use to target people. The concept has been used by con artists and scammers for thousands of years. What is new is that the Internet makes it very easy for a cyber-criminal anywhere in the world to pretend to be anyone they want and target anyone they want. Below are the three most common types of social engineering methods that cyber attacker
Download PDF -
Identity Theft: Preventing, Detecting, and Responding
In today's digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and knowing how to protect yourself are essential elements in safeguarding your online digital life.
Download PDF -
Messaging Do's and Don'ts
Messaging serves as a primary mode of communication in both our personal and professional lives. However, quite often we can be our own worst enemy when it comes to text messaging safely and securely. Learn the most common mistakes people make and how you can avoid them in your day-to-day lives.
Download PDF -
QR Codes
Have you ever wondered what those squares of dots or bars called "QR codes" are all about? You most likely have seen them posted on websites, printed on posters, used as mobile tickets, or on restaurant tables. How do these work, and are there risks you should be worried about? Let's find out.
Download PDF -
The Power of the Passphrase
Are you tired of constantly creating complex passwords? Frustrated with having to remember and type all those characters, symbols and numbers? Well, we have a solution for you: the ever-powerful passphrase!
Download PDF -
I'm Hacked, Now What?
The internet can be overwhelming, with new technologies changing all the time. No matter how safe you try to be, sooner or later you may be unfortunate enough to get hacked. The sooner you detect something bad has happened, and the faster you respond, the more you can minimize the impact. Below are signs that you may be hacked and if so, suggestions to resolve it.
Download PDF -
The Power of Updating
Cyber attackers are constantly looking for and finding new vulnerabilities in the software you use every day. A vulnerability is a mistake or weakness in how software was developed. This software may run your laptop, the mobile apps on your smartphone, or perhaps even the software in your thermostat. Cyber attackers take advantage of and exploit these software vulnerabilities, allowing them to remotely break into systems, including the ones you use. At the same time, the vendors who create the d
Download PDF -
Online Security for Kids
Our kids' lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the most of online technology, safely and securely?
Download PDF -
The Power of Password Managers
Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password rules and many require additional security measures such as security questions. Wouldn’t it be great if there was a single solution to take care of all your password problems? There is. It’s called a password manager.
Download PDF -
Stop Those Phone Call Scams
David was busy watching his favorite streaming series when he got a phone call from a number he did not recognize. The area code was the same as his, so he assumed it was someone local and answered the phone. Right away David was asked to confirm his full name. The caller then stated that he was from the police department and that a warrant had been issued for David’s arrest. David’s taxes were outstanding and if they were not paid in the next 24 hours, the police would have to arrest him. David
Download PDF -
College Parents: Don’t Leave Money on the Table!
My daughter Kayla will be starting her second year at the University of St. Thomas in September. With her first year under her belt, our family knows what to budget – and borrow – to pay for her college.
Read More -
Securing Your Financial Accounts
Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking or savings accounts, but also investments, retirement, and online payment accounts like PayPal. Fortunately, with some simple, fundamental steps, you can protect yourself.
Download PDF