skip to main content

CBWY Blog

Protecting Your Cybersecurity When Children Are At Home

Protecting Your Cybersecurity When Children Are At Home

While there are risks associated with remote work, the odds of a malware attack increase when more family members use the same device, especially children.

“The malicious code children collect on their way to something you’ve never heard of can hijack your computer for all kinds of purposes. There are click-harvesting scams. There are stealth programs that will turn your machine into a spambot. There’s malware that looks OK to your anti-virus program, but is actually recording every keystroke, most particularly when you log into your bank account,” warns CyberScout founder and chairman Adam Levin. 

continue reading

Why Businesses Should Consider Offering Identity Fraud and Theft Protection to Employees

Why Businesses Should Consider Offering Identity Fraud and Theft Protection to Employees

Many companies will offer identity fraud and theft protection services to customers who have had their data compromised in a breach, but relatively few provide it as a benefit to their employees—just 25 percent as of 2019. This approach ends up costing businesses in the long run, according to CyberScout founder and chairman Adam Levin.

“If you don’t subscribe to an identity theft resolution service or lack a plan of action before you suffer a personal compromise, you will need to spend more time and more money than you are probably prepared to spend,” said Levin.

continue reading

Three Ways to Protect Your Business From Domain Name Hacks

Three Ways to Protect Your Business From Domain Name Hacks

“Domain names are far from the only vector of attack, but they're one of the most visible,” says CyberScout founder and chairman Adam Levin.

Although hackers can deploy a wide array of methods to hijack domain names, there are fortunately several ways businesses and organizations can protect against them.

continue reading

How Typosquatting Hacks Can Target Your Company

How Typosquatting Hacks Can Target Your Company

Typosquatting is perhaps the least sophisticated form of domain name hacking. It relies on user error, specifically the odds of a user mis-typing a URL address into their web browser. Hacker register a misspelled version of a well-known domain name, such as “gooogle.com” or “gooogl.com” rather than google.com. (Important: do not visit either “gooogle.com” or “gooogl.com”. They are dangerous).

continue reading

Understanding DNS and Cybersecurity

Understanding DNS and Cybersecurity

Domain names are a foundational service of the Internet, and are controlled by a protocol called Domain Name System, or DNS. While the details are complicated, DNS ultimately serves a straightforward purpose: it helps route traffic on the internet using human-friendly names. Everything connected to the internet, from smartphones and fitness trackers to enterprise-level email servers, has a unique identifying address called an IP address. Every activity on the internet, from checking email to web browsing to posting to Instagram is a means of connecting a request from one IP address to its destination IP address. 

continue reading

What's In a Domain Name? Your Company's Cybersecurity.

What's In a Domain Name? Your Company's Cybersecurity.

Your company’s online presence relies on a domain name. That domain name is registered, and you would think as a result that it would be hard for a criminal to steal, but that’s not the case. Domain name compromise makes possible a wide array of attacks--including the introduction of ransomware and other extinction-level exploits.

While no business can make themselves a hundred percent cybersecure, understanding not only the way domain names work, but also how they can be leveraged by hackers is mission critical when it comes to avoiding common security pitfalls.

continue reading

Think Ransomware Can't Put You Out of Business?

Think Ransomware Can't Put You Out of Business?

We’re not even halfway through 2020, and already it’s been a record-breaking year for ransomware attacks. Barely a week goes by without reports of a new strain or variant of malware wreaking havoc among companies. No industry, category, size, or group is safe from this cyber scourge.

continue reading

These Summer Scams Target Victims At Home and Work

These Summer Scams Target Victims At Home and Work

Not all summer scams target unwary travelers. There are legion crimes waiting to happen that target their victims at home or in the workplace.

continue reading

How To Identify Travel Scams

How To Identify Travel Scams

Vacation season presents a golden opportunity for scammers. Their targets are typically looking for bargains and are more likely to let their guard down, especially now with demand for rentals and hotel space at an all time high. For those hoping to get some rest and relaxation away from work and other responsibilities, the competition for that perfect vacation spot can present a perilous lure--and scammers know it.

continue reading

Be On The Lookout For These Covid-19 Healthcare Scams

Be On The Lookout For These Covid-19 Healthcare Scams

Covid-19 quickly revealed shortages (and organizational) shortcomings that worried consumers, whether it was the availability of PPE supplies, medical treatments, or diagnostic tests. Each of these deficits provided criminals with hard to resist lures that continue to be used in phishing and malware campaigns.

continue reading

RSS
123

Theme picker

There is a Difference.
Commerce Bank of Wyoming is committed to website compliance with the Americans with Disabilities Act.
We strive to make our site useful and accessible to everyone. If you have questions or comments regarding the website please contact us.
copyright © 2004-2020 Commerce Bank of Wyoming. All rights reserved. / sitemap / Admin Login
top
^