Security Tips

 

Monthly Security Tips NEWSLETTER                                (Select Below)

Security Tips:


  1. 2018

  2. September - Avoiding Many Types of Malware

  3. August - Want to keep your data? Back it up!

  4. July - Sun, Sand, and Cybersecurity

  5. June - How to Spot Phishing Messages Like a Pro

  6. May - Reducing your Information Footprint

  7. April - Securing Devices by Making Simple Changes

  8. March - Staying Safe from Tax Scams

  9. February - Spotting and Avoiding Olympic Scams

  10. January - National Data Privacy Day, January 28th


  11. 2017

  12. December - Avoiding Holiday Scams

  13. November - Shopping Safely Online

  14. October - National Cyber Security Awareness Month 2017

  15. September - Staying Secure on Social Media

  16. August - Connected Home Devices: The Internet of Things

  17. July - Identifying and Reporting Common Scams

  18. June - Sun, Sand, and Cybersecurity

  19. May - Are You Really Being Secure Online?

  20. April - Digital Spring Cleaning

  21. March - Common IT Wisdom That Keeps You Secure

  22. February - Staying Safe from Tax Season Scams

  23. January - Looking Forward: 2017’s Top Threat Prediction


  24. 2016

  25. December - New Device? Check Your CyberSecurity!

  26. November - Cyber Tips for Holiday Shopping

  27. October - Malware

  28. September - Two-Factor Authentication

  29. August - Back to School

  30. July - Going for Gold in Cybersecurity

  31. June - Traveling Securely

  32. May - Cybersecurity Information Sharing Act of 2015

  33. April - Phishing Emails and You

  34. March - Why Strong, Unique Passwords Matter

  35. February - Avoiding Online Tax Scams

  36. January - The Hidden Costs of a Data Breach


  37. 2015

  38. December - Getting Your Device and Checking It Twice

  39. November - Safe Online Holiday Shopping

  40. October - Malware Wears Costumes, Too

  41. September - New Credit Card Chip Technology

  42. August - The Harm in Password Reuse

  43. July - Sun, Sand, and Cyber Security

  44. June - Social Engineering Through The Internet

  45. May - Don’t Take the Bait on Phishing Scams

  46. April - Security in the Mobile Era

  47. March - Avoiding Online Tax Scams

  48. February - Protecting Against Cybercrime

  49. January - 2015 Cyber Security Outlook


  50. 2014

  51. December - Make Your List and Check it Twice: Follow these tips for securing your new computer or device.

  52. November - Online Holiday Shopping: Tips for Keeping Your Information Secure

  53. October - Trick or Treat... or Should We Say Trick or Threat

  54. September - Social Media Scams -- Spot Them Beforehand!

  55. August - Secure Online Banking

  56. July - Cyber Security and Your Summer Vacation

  57. June - Bots, Botnets, and Zombies

  58. May - Protecting Against Mobile Malware

  59. April - Hacked! Now What?

  60. March - Protect Yourself from Online Tax Scams

  61. February - Personal Backup and Recovery of Your Data

  62. January - 2014 Cyber Security Outlook


  63. 2013

  64. December - Cyber Hygiene with the Top 20 Critical Security Controls

  65. November - Cyber Monday and Online Shopping Season: What You Need to Know to Protect

  66. October - Take the CIS Cyber Security Pledge

  67. September - Social Networking Sites: Security and Privacy Issues

  68. August - Java Exploits

  69. July - Using Wi-Fi: Connect With Care

  70. June - Keeping Senior Citizens Safe Online

  71. May - Do You Know Where Your Personal Information Is?

  72. April - Protect Yourself from Email Phishing Attacks

  73. March - Protect Yourself from Email Tax Scams

  74. February - How Do I Protect the Information on My Smartphone?

  75. January - Emerging Trends and Threats for 2013


Security Awareness:

  1. Awareness of Back to School Scams

  2. Visit the InfraGard Kansas City Members Alliance (IMA) Website for Security Tips on Critical Infrastructure Protection


DDoS Attacks:

  1. Center for Information Security’s Guide to DDoS Attacks


Andrew R. Reese


Mobile: (717) 395-3063


Links to more detail:

  1. My CV Overview

  2. Security Practice

  3. My Security Pledge

  4. My LinkedIn Articles