Most often, malicious web servers use the HTTP protocol directly without data encryption. Hence the advice to validate which protocol is being used. Although rare, this does not mean that an attacker cannot use the HTTPS protocol on their fake or malicious website. In that case, it doesn’t matter that a site will be super secure and have all kinds of security locks if the person behind it is an attacker.
From “The Gal Times” Edit Porkson (2/20/2022)
IT security is still viewed as the IT team’s problem when that’s not the case at all. All employees have a responsibility to ensure the security of their business. Your people are the frontline of your defense and represent its biggest attack surface. They are the people hackers are targeting with phishing campaigns because they’re banking on a lack of security knowledge.
From “Digital Journal” Dr. Tim Sandle (2/11/2022)
Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make. Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.
From “Federal Trade Commission” Alvaro Puig (2/02/2022)
Don’t deal with a vendor that requires payment by cryptocurrency, gift card, or wire transfer. That’s sure to be a scam.
From “Federal Trade Commission” Rosario Méndez 1/27/2022