Archive | Security

RSS feed for this section
TDS

Scam alert: DocuSign phishing attack

DocuSign has acknowledged a breach of their customer and user email addresses. As a result, the email addresses are now the target of a malicious email campaign. TDS is encouraging customers to be cautious. If you receive an email from DocuSign, with an attachment or link, be careful. For more information, contact DocuSign.
Read full story Comments { 0 }
TDS

Clever Gmail login scam is still tricking people

We’ve told you about phishing scams before, and even scams that take advantage of your misspellings or fat-finger moments—but this one? It may just take the cake in terms of sneakiness. If you have a Gmail/Google sign in, listen up (and don’t open any attachments until you read this). But even if you don’t have a Google login, this kind of technique could be used for other services so keep reading.
Read full story Comments { 1 }
TDS

Security Alert: Cloudbleed vulnerability exposes sensitive data across the internet

A new security vulnerability has hit the web you should know about. This code error may have caused passwords, messages, cookies and more to leak onto the internet. While there’s reason not to panic, there are steps you should take to protect yourself.
Read full story Comments { 0 }
Password by Graphics Mouse

How crackable is your password?

We may scoff at those who actually use the word “password” as their password (or "123456"), but we probably shouldn’t be too smug. After all, are your passwords really any good? They may not be nearly as awesome as you think.
Read full story Comments { 2 }
cordless telephone_cropped

Phone scam: whatever you do, don’t say “yes”

Reports of a new phone scheme have been hitting media outlets (including USA Today and CBS News) for the last few days. It’s being coined the “Can you hear me?” scam and it may take only one word to fall for it. We have what you need to know.
Read full story Comments { 0 }
TDS

7 ways to celebrate Data Privacy Day (yes, really)

Admittedly, on the surface, Data Privacy Day doesn’t seem super exciting. There’s no themed merchandise, no cards to purchase, and no special foods to make—but there is a gift to be given. By celebrating this unlikely holiday, you can give yourself the gift of control. Specifically, control over your personal information and when, and with whom, you share that data.
Read full story Comments { 2 }
TDS

Five ways to spot a phishing scam

It's called "phishing" because cyber criminals try to lure you into their trap, often using a legitimate-looking emails, hoping you take the bait. Their goal? To trick you into revealing account numbers and payment information. The REAL trick is being alert and knowing what to look for so you don't fall for this kind of scam. Since most phishing emails have some common elements, they're easy to spot once you know what to watch for.
Read full story Comments { 3 }
Security lock_FreeDigitalPhotos

New year, new security threats

It’s a brand-spanking new year and it’s coming with fresh round of online security challenges. There are three new issues you should know about (and take action on), to keep your personal information safe.
Read full story Comments { 0 }
online-shopping-2-pexels

‘Tis the season…for phishing scams!

November and December are crazy busy for most of us. We’re shopping, traveling, and also attending (and hosting) holiday celebrations. This is all good news for scammers. Our distraction makes it the perfect time to take advantage of even the most vigilant of us. Find out what you can do stay safe this holiday season.
Read full story Comments { 1 }
by-david-castillo-dominici-at-free-digital-photos

What to do if you’re a victim of a data breach

Unfortunately, in today’s world, data breaches happen. Companies and websites get hacked, or scammers trick people—maybe even you—into revealing important information. If you think your data has been stolen, your first step shouldn’t be to panic. Instead, take a deep breath and follow these steps so you can regain control over your information and minimize any potential damage.
Read full story Comments { 4 }