Cyberscout Articles - Blog | NebraskaLand Bank | Personal & Business Banking
skip to main content

NLB Blog

SOCIAL MEDIA PRIVACY: ARE YOU GUILTY OF OVERSHARING?

SOCIAL MEDIA PRIVACY: ARE YOU GUILTY OF OVERSHARING?

Chances are, you’re among the 72% of Americans who use social media. Maybe you enjoy the “short and sweet” appeal of Twitter and Snapchat, or you like Facebook because it’s a great place to stay in touch with old friends and family. If you’re a real social media maven, you could be active on all the major platforms. It doesn’t matter which site or app you choose, though. What is important is how you use social media and what you’re sharing — or oversharing.

continue reading "SOCIAL MEDIA PRIVACY: ARE YOU GUILTY OF OVERSHARING?"

PREPARING FOR THE RISKS 2023 MAY BRING

PREPARING FOR THE RISKS 2023 MAY BRING

As the year comes to a close, many people pause to reflect on the past 12 months and prepare for the new year ahead. That pause and reflection can often help us reset our perspective and prepare for the new year. When it comes to evaluating the evolving risks to our personal information, an end-of-year recap can be useful to prepare for the new risk trends that are on the horizon. 

continue reading "PREPARING FOR THE RISKS 2023 MAY BRING"

WHAT IS CREDENTIAL STUFFING?

WHAT IS CREDENTIAL STUFFING?

Credential stuffing is a type of cyberattack where cybercriminals take large databases of usernames and passwords, often stolen through recent data breaches, and attempt to “stuff” the account logins into other web applications using an automated process. Such attacks are common, as 63% of the data compromised in social engineering attacks were login credentials.

continue reading "WHAT IS CREDENTIAL STUFFING?"

5 TIPS TO PROTECT YOUR BUSINESS AGAINST CYBERATTACKS

5 TIPS TO PROTECT YOUR BUSINESS AGAINST CYBERATTACKS

Companies often claim that their employees are their greatest asset. Another valuable asset is the data that those companies collect about their employees, customers and vendors. Every business should be helping to ensure their staff understands the value of data and the importance of protecting it. Continuous education programs can help safeguard your employees’ confidential information and protect against the cyberattacks and data breaches that can lead to financial damage, fraud, and identity theft. Embedding helpful reminders and security best practices throughout employee and customer communications is an ongoing process.

continue reading "5 TIPS TO PROTECT YOUR BUSINESS AGAINST CYBERATTACKS"

WHAT IS RANSOMWARE?

WHAT IS RANSOMWARE?

Ransomware is a form of malware, or malicious software, used to encrypt sensitive files held in business and personal devices, essentially locking users out of their own data or networks. Once deployed, the ransomware encryption restricts access to files and the victim receives a notice that a “ransom” must be paid to unlock the data or device. The ransom request often requires payment by Bitcoin or other types of anonymous cryptocurrency. Access to data is supposed to be restored once the ransom is paid and the attackers provide a decryption key.

continue reading "WHAT IS RANSOMWARE?"

Caller ID Spoofing Scams Prey on Trust

Caller ID Spoofing Scams Prey on Trust

Caller ID or phone spoofing is a phone scam whereby callers impersonate government officials, financial institutions, or legitimate companies by using fraudulent displays of phone numbers (or “spoofs”) to gain the victim’s trust and get them to disclose personally identifiable information (PII) or sensitive financial information. 

continue reading "Caller ID Spoofing Scams Prey on Trust"

THREE GIFT CARD SCAMS TO AVOID

THREE GIFT CARD SCAMS TO AVOID

Gift card fraud affects digital and physical gift cards alike. While fraudsters may approach gift card fraud with a variety of scams, the goal is to steal the funds from the cards while remaining undetected. Most likely, you’ve probably bought and/or received at least one gift card this year. Whether it was for a birthday, holiday, special event or “just because,” gift cards are the most wanted – and the most popular gift in the U.S. for nearly any occasion. Retailers and consumers have felt an increase in gift card scams, with victims reporting over $148 million stolen in the first nine months of 2021, more than all of 2020. Gift card fraud is on the rise, and the Federal Trade Commission (FTC) warns it’s a popular method for scammers to steal money. Let’s look at some ways that fraudsters use scams to commit theft.

continue reading "THREE GIFT CARD SCAMS TO AVOID"

WHAT ARE SCAMS?

WHAT ARE SCAMS?

Scams are everywhere as criminals try to cash in by stealing money or valuable personal information from victims. And given our modern reliance on technologies like smartphones and the internet, if you haven’t been a victim of a scam, you’ve likely been targeted by one.

continue reading "WHAT ARE SCAMS?"

DISRUPTING THE FLOW OF TODAY’S INTERCONNECTED CYBERTHREATS

DISRUPTING THE FLOW OF TODAY’S INTERCONNECTED CYBERTHREATS

Recognizing the tactics used by attackers and understanding how they work together can help us avoid them. Cybercriminals use several tactics to access your personal and business data. Increasingly, they’re layering these tactics so one attack strengthens the next.

continue reading "DISRUPTING THE FLOW OF TODAY’S INTERCONNECTED CYBERTHREATS"

When Filing Taxes This Year, Apply for an Identity Protection PIN

When Filing Taxes This Year, Apply for an Identity Protection PIN

Taxpayers filing in 2021 are now eligible for one-time use identity protection PIN from the Internal Revenue Service.

continue reading "When Filing Taxes This Year, Apply for an Identity Protection PIN"

RSS
1345Last
top
^