Don’t Just Close Your Browser

Quick Tip: LOGOFF and then close your web browser.

Why: If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. When online accessing a banking site or any other application containing sensitive data, make sure you logoff of the site and THEN close your browser.

Use STRONG Passwords

Quick Tip: To make it easier to remember your password, use a phrase and insert letters and numbers into it, like: 1!u>R0ck&R0!! (Translation: Iluvrock&roll)

Why: Hackers can try millions of possible password combinations per second using powerful brute-force-attack software that is readily available online.

Watch Out for Look-A-Like Domain Cyber Threats

Recently, we've seen several victims fall prey to cyber threats like this which employ a combination of a phishing email to gain access to a mailbox and then waiting until the opportune time to hook the prey using a look-a-like domain.  Here's a short video explaining what happened:

Sneaky hackers purchase and set up fraudulent websites that are a close misspelling of legitimate ones.

Everybody Loves a Parade!

Did you know that the tradition of the Macy’s Thanksgiving Day Parade started as a Christmas parade? It started in 1924, ran 6 miles from 145th street all the way down to the Macy’s store at 34th and Broadway.

The entire parade consisted of three horse-drawn floats including Mother Goose, Little Miss Muffet, four bands, a variety of animals from the Central Park Zoo and, of course, Santa Claus was the last one in the lineup.

Bookmark the LEGITIMATE Websites You Frequently Visit

Quick Tip: Create a bookmark for the websites you visit often.

Why: Sneaky hackers purchase and set up fraudulent websites that are a close misspelling of legitimate ones.

For example, a hacker might use "faceboook.com" instead of "facebook.com". All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking, fake copy of the site you were trying to get to--and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.

How to Spot a Phishing Email

Quick Tip: Type website names directly into your browser for any “phishy” offer delivered by email. That way you do not give away your log in information or download a virus.

Why: A phishing email is a bogus email carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.