Showing Results 141 - 147 of 147
  • What is CEO Fraud?

    Cyber criminals are sneaky - they are constantly coming up with new ways to get what they want. One of their most effective methods is to target people like you. While cyber attackers have learned that unaware people are the weakest link in any organization, they have forgotten that knowledgeable people like OUCH! readers can be an organization's best defense.

    Download PDF
  • Encryption

    You may hear people use the term "encryption" and how you should use it to protect yourself and your information. However, encryption can be confusing and you should understand its limitations. In this newsletter, we explain in simple terms what encryption is, how it protects you, and how to implement it properly.

    Download PDF
  • Secure File Transfer

    New Market Bank is now offering its customers the ability to send a secure email to the bank. Secure email is a great way to communicate with us and the only way to be sure your confidential information, account number, tax id numbers and financial statements are delivered securely.

    Read More  
  • What is Malware?

    You may have heard of terms such as virus, trojan, ransomware, or rootkit when people discuss cyber security. All of these words describe the same thing, types of programs used by criminals to infect computers and devices. A common term used to describe all these different programs is the word malware. In this newsletter, we will explain what malware is, who creates it and why, and most importantly, what you can to do protect yourself against it.

    Download PDF
  • I'm Hacked, Now What?

    We know you care about protecting your computer and mobile devices and take steps to secure them. However, no matter how securely you use technology, you may eventually be hacked or "compromised." In this newsletter, you will learn how to determine if your computer or mobile device has been hacked and, if so, what you can do about it. Ultimately, the quicker you detect something is wrong and the faster you respond, the more likely you can reduce the harm a cyber attacker can cause.

    Download PDF
  • Internet of Things (IoT)

    In the past, technology was relatively simple; you just connected your computer to the Internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges. The next big technical advancement is the Internet of Things. The Internet of Thi

    Download PDF
  • Stepping up for Small Business with PPP Funding

    Anita Drentlaw

    For months now, every facet of “normal” life has been upended by COVID-19. Where and how we work, learn, shop, socialize and even bank have all been affected. Yet, the bright spot amid this sea of change has been America’s enduring spirit as friends and neighbors work together to stay safe, remain connected, and support one another.

    Read More  
Showing Results 141 - 147 of 147