Phishing: fraud through legitimate looking emails SMiShing: phishing via texts and SMS messages Vishing: voice phishing via phone calls Phone numbers, emails and links to websites can look like real communications from trusted sources when they could be scams.  Messages encourage you to react quickly and if you do not react, the communications indicate you’ll face consequences. Phishing and SMiShing …

Ransomware is a form of malware that targets information on your computer for the purpose of extortion.  After the user has been locked out of a system or important information has be gained, the cyber actor demands a ransom payment. Examples of Ransomware “Your computer was used to visit websites with illegal content. To unlock your computer, you must pay …

Malware is a catch-all term covering anything bad on the internet including viruses, worms, and other harmful computer programs to destroy and gain access to sensitive information. Types of Malware: 1. Virus – software that enters its’ own code and replicates itself 2. Worm – replicates itself similar to a virus but doesn’t spread to other systems 3. Trojan – …