Security Tips - Sunwest Bank
Important Articles
 

Security Tips

  • All
  • Cyber Tips
  • Family Safety
  • Identity Theft
  • Information Security Awareness
  • Small Business Security

In the past, securing your home computer network was the responsibility of the experts who installed it, but today's Internet users often install their own home networks....

As technology continues to evolve, everyday objects are created to connect to the Internet resulting in the usage of the term “The Internet of Things” (IoT). Connected devices, such as your smart TV and your smart car, are interconnected and automated over a wireless network....

Cybercriminals are getting more creative by using new techniques to worm their way into the computers (and wallets) of unsuspecting victims. One of the sneakiest methods currently used by cybercriminals is scareware, a tactic which preys upon our fears to make us take action which ultimately ends up compromising our own security....

ATM machines can be found just about anywhere today –  from shopping malls to flea markets. They’re a great convenience, but ATMs located in low-traffic, dimly lit locations can compromise your safety....

Text message spam is just as bad as its email spam relative. Spam of all types can appear harmless, promising free gifts, discounts or product offers, but the goal is for the sender to retrieve as much of your personal information as they can or infect your device with a virus....

Ransomware is a growing problem that is now affecting websites around the world by infecting the folders associated with serving web pages....

Ransomware is a type of “data kidnapping” where malicious software (malware) is used to block access to a computer system and hold it hostage until a ransom fee is paid....

Trust is an essential element of customer relationships. When it comes to Internet security, your customers trust you to protect the personal information they share with you. You would never knowingly put them at risk, but lax computer security practices can do just that -- jeopardize your customers' sensitive information and expose them to threats....

When you do something on your computer, such as accessing your checking account on your bank's website, you type your user name, password, etc. on your keyboard. Your keystrokes travel along a path in the operating system to reach the destination application, so your bank can verify your identity and grant you access....

A point-of-sale (PoS) device is one of the most important features in any retail location; it’s where all purchases are finalized. With headlines announcing major retail, entertainment and healthcare industry breaches, you might have asked yourself, “How can my environment become breached?” or “How do I protect my business from cyber-attack?” ...

Loading new posts...
No more posts