Cybersecurity

Reporting Email/Text/Phone Fraud

The US government has drastically streamlined the process for reporting fraud whether email, text, or phone.  While not every suspicious contact needs to be reported to the FTC (Sam Spam is best handled by reporting it to IT), any email, phone, or text that is trying to get money, gift cards, or ...

Why Use LastPass Password Manager

LastPass is a password (and other information) manager. It provides a very safe mechanism for: storing passwords and other important information like account numbers, PINS, contact info... You only have to remember 1 password and since we are using our network passwords - you have that memor...

Public Wi-Fi

Public Wi-Fi offers a convenient solution, allowing us to work, browse, and socialize online while on the go. However, this convenience can come with hidden risks. evil twin attack An evil twin attack is a cyber attack where a hacker creates a fraudulent Wi-Fi network that looks legitimate to use...

Mobile Security Device Measures

Making your smartphone more secure is crucial in protecting your personal information, communications, and digital footprint. Below are steps you can take to enhance the security of your mobile devices: Strong Lock Screen Security Use a strong passcode, preferably use a combination of letters...

Top 10 Key Words in Phishing Emails

Staying Secure at Home

AI Chatbot Dos and Don'ts

When in Doubt Check it Out

AI Chatbots

What are AI Chatbots? They are computer programs that are trained to understand and communicate using human language to asnwer user questions and generate automatic responses in the form of a conversation. What are the essential security tips I should keep in mind when using an AI chatbot for wor...

Sharing a Password Securely

At TFCA, we use Password Pusher for sharing passwords and other sensitive information with other people securely. Password Pusher exists as a better alternative to emailing passwords. It avoids having passwords exist in email archives in perpetuity. It does not exist as a end-all security solutio...

Zero-Click Vulnerability

A zero-click vulnerability is a type of security flaw that allows an attacker to compromise a device or system without any user interaction. Unlike traditional exploits that require the user to click on a malicious link or download a file, zero-click vulnerabilities exploit weaknesses in software...