skip to main content

We Want To Hear From You!

Please take a few moments to complete our survey.

View Survey   Close

CBWY Blog

Three Ways to Protect Your Business From Domain Name Hacks

Three Ways to Protect Your Business From Domain Name Hacks

“Domain names are far from the only vector of attack, but they're one of the most visible,” says CyberScout founder and chairman Adam Levin.

Although hackers can deploy a wide array of methods to hijack domain names, there are fortunately several ways businesses and organizations can protect against them.

continue reading

Comm(unity) Shred Day

Comm(unity) Shred Day

Shred day is back!  We are happy that so many in our community take the threat of identity theft seriously and continue to shred their physical documents that contain sensitive personal information. Our Community Shred Day event offers free shredding services for personal documents such as bills, banking statements, credit card offers and more.  The public is invited to join us in protecting their identity and sensitive personal information through our secure shredding service.

continue reading

How Typosquatting Hacks Can Target Your Company

How Typosquatting Hacks Can Target Your Company

Typosquatting is perhaps the least sophisticated form of domain name hacking. It relies on user error, specifically the odds of a user mistyping a URL address into their web browser. Hacker register a misspelled version of a well-known domain name, such as “gooogle.com” or “gooogl.com” rather than google.com. (Important: do not visit either “gooogle.com” or “gooogl.com”. They are dangerous).

continue reading

Understanding DNS and Cybersecurity

Understanding DNS and Cybersecurity

Domain names are a foundational service of the Internet, and are controlled by a protocol called Domain Name System, or DNS. While the details are complicated, DNS ultimately serves a straightforward purpose: it helps route traffic on the internet using human-friendly names. Everything connected to the internet, from smartphones and fitness trackers to enterprise-level email servers, has a unique identifying address called an IP address. Every activity on the internet, from checking email to web browsing to posting to Instagram is a means of connecting a request from one IP address to its destination IP address. 

continue reading

What's In a Domain Name? Your Company's Cybersecurity.

What's In a Domain Name? Your Company's Cybersecurity.

Your company’s online presence relies on a domain name. That domain name is registered, and you would think as a result that it would be hard for a criminal to steal, but that’s not the case. Domain name compromise makes possible a wide array of attacks--including the introduction of ransomware and other extinction-level exploits.

While no business can make themselves a hundred percent cybersecure, understanding not only the way domain names work, but also how they can be leveraged by hackers is mission critical when it comes to avoiding common security pitfalls.

continue reading

Think Ransomware Can't Put You Out of Business?

Think Ransomware Can't Put You Out of Business?

We’re not even halfway through 2020, and already it’s been a record-breaking year for ransomware attacks. Barely a week goes by without reports of a new strain or variant of malware wreaking havoc among companies. No industry, category, size, or group is safe from this cyber scourge.

continue reading

These Summer Scams Target Victims At Home and Work

These Summer Scams Target Victims At Home and Work

Not all summer scams target unwary travelers. There are legion crimes waiting to happen that target their victims at home or in the workplace.

continue reading

How To Identify Travel Scams

How To Identify Travel Scams

Vacation season presents a golden opportunity for scammers. Their targets are typically looking for bargains and are more likely to let their guard down, especially now with demand for rentals and hotel space at an all time high. For those hoping to get some rest and relaxation away from work and other responsibilities, the competition for that perfect vacation spot can present a perilous lure--and scammers know it.

continue reading

Beware These Summertime Scams

Beware These Summertime Scams

With the arrival of summer and the easing of shelter in place restrictions nationwide, people are planning vacations, looking for jobs, and starting home improvement projects. 

Unfortunately, scammers are gearing up to take advantage of these summertime, post-quarantine activities with a wide array of schemes aimed at turning your plans, projects and even your aspirations into cold hard cash.

continue reading

Quarantine Fatigue Is Real and It Could Kill Your Company

Quarantine Fatigue Is Real and It Could Kill Your Company

Quarantine fatigue is not only sending people to crowded bars in Wisconsin. We’re all getting tired of it — call it quaran-tigue — and that could spell trouble on the cybersecurity front. 

Multiple studies and articles of late have noted a trend that could have serious repercussions in the days, weeks and months to come. The caution employers and employees alike had talked about in making WFH (work from home) a workable, secure answer to widespread social distancing measures has given way to overconfidence. 

continue reading

RSS
245Last

Theme picker

There is a Difference.
Commerce Bank of Wyoming is committed to website compliance with the Americans with Disabilities Act.
We strive to make our site useful and accessible to everyone. If you have questions or comments regarding the website please contact us.
copyright © 2004-2020 Commerce Bank of Wyoming. All rights reserved. / sitemap / Admin Login
top
^