skip to main content

NLNB Blog

Why Do Bank Holidays Exist?

Have you ever wondered why banks seem to be randomly closed on certain days of the year? Read about bank holidays and the real reason many banks are closed on certain days during the calendar year on today's blog post.

continue reading

Phishing for Dollars: How to Prepare for a Payroll Phishing Scam

<a href="http://cyberscout.com/education/blog/phishing-for-dollars-how-to-prepare-for-a-payroll-phishing-scam">Phishing for Dollars: How to Prepare for a Payroll Phishing Scam</a>
A new breed of phishing scam is hitting employers around the world-and it's targeting employees' paychecks. Here's how a payroll phishing scam works: Scammers create an authentic-looking email that appears to be sent from the employer. The...

continue reading

Identity Fraud Hits All Time High: What You Can Do to Protect Yourself

<a href="http://cyberscout.com/education/blog/identity-fraud-hits-all-time-high-what-you-can-do-to-protect-yourself">Identity Fraud Hits All Time High: What You Can Do to Protect Yourself</a>
Not to name names (cough, cough, Equifax), but it seems a particular data breach involving the sensitive information of 145.5 million people may have something to do with the spike in identity-related crimes reported in Javelin Strategy and...

continue reading

Blackout: Critical Infrastructure Attacks Will Soar in 2018

<a href="http://cyberscout.com/education/blog/blackout-critical-infrastructure-attacks-will-soar-in-2018">Blackout: Critical Infrastructure Attacks Will Soar in 2018</a>
There was a stunning cyberattack on a critical Middle Eastern infrastructure site recently and it hasn’t gotten the public scrutiny it deserves. Triton (A.K.A. Trisis), a new strain of malware, was discovered last month via intelligence sharing...

continue reading

5 Mistakes Of First Time Home Buyers

If you’re one of many first time home buyers, there are some typical mistakes to avoid. Click here to learn more and not make the same mistakes!

continue reading

2017: Another Record-Breaking Year for Data Breaches

<a href="http://cyberscout.com/education/blog/2017-another-record-breaking-year-for-data-breaches">2017: Another Record-Breaking Year for Data Breaches</a>
The Winter Olympics are coming up, and athletes from all over the globe are focusing on breaking records and winning gold. While the rest of the world watches the competitive glory unfold, there's another record-breaking event wrapping up, but...

continue reading

How to Fix Your Credit After Identity Theft

<a href="http://cyberscout.com/education/blog/how-to-fix-your-credit-after-identity-theft">How to Fix Your Credit After Identity Theft</a>
Identity theft and credit card fraud are on the rise. Advisory firm Javelin Strategy & Research reported a 16 percent increase in the “identity fraud incidence rate” in 2016, the highest since the firm started tracking in 2003. The result? A...

continue reading

CyberScout Rebranding Recognized

<a href="http://cyberscout.com/education/blog/cyberscout-rebranding-recognized">CyberScout Rebranding Recognized </a>
It was just one year ago that we changed our company name to reaffirm our mission to watch over clients in a dangerous world of pervasive cyber threats. Now, we're excited to be recognized for efforts. The latest issue of NAMIC's [IN]surance...

continue reading

FitBit Reveals Troop Locations in Global Hotspots

<a href="http://cyberscout.com/education/blog/fitbit-reveals-troop-locations-in-global-hotspots">FitBit Reveals Troop Locations in Global Hotspots</a>
In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit personal trackers to military personnel in 2013 to fight obesity. Fast-forward to 2018, and The...

continue reading

How Flawed Intel Chips Could Ignite Next-Gen Hacking

<a href="http://cyberscout.com/education/blog/how-flawed-intel-chips-could-ignite-next-gen-hacking">How Flawed Intel Chips Could Ignite Next-Gen Hacking</a>
Just when you thought it was impossible to use a connected device without getting hacked, 2018 arrives with the discovery of an entirely new class of network vulnerability built into the processors of virtually every computing device in active...

continue reading

RSS
123456789
top
^