Helpful DuGood Articles

about Security

Every day hackers prowl social media networks looking for victims. They use spyware to remotely access your phone, laptop, iPad or computer through downloads, emails, or instant messages in hopes of obtaining your social media passwords.

One the best ways you can defend yourself against identity theft or other forms of fraud is to shred important documents when you don’t need them anymore. But, what is considered an important document? The following is what we recommend you shred:

Telemarketing scams have been a very common way of committing fraud for many years.  According to the National Consumers League’s Internet Fraud Watch, there are some scams that are more prevalent than others. Let’s take a look at the most common Telemarketing Fraud Scams in the United States.

If you own a laptop, tablet, or other mobile device, it’s likely that at some point in time you have connected to a WiFi access point. In some cases, this access point might be in your own home while in others it may be at work, a hotel, airport, or your local coffee shop. No matter where you connect, the reality is that WiFi has eliminated the need for wires and enables you to remain connected throughout the day.

Lately, it seems the spammers trying to fish for your login credentials for your Office 365 account are working overtime. A barrage of phishing spam has been hitting inboxes and they are relentless this time. The subjects change, the message change, and they are becoming so flawless in their phishing “artistry” that it is nearly impossible to tell if they are real or not. Odds are, however, that they are most certainly NOT legitimate, so pay close attention and use your phishing detectors to weed them out of your inbox.