Upskill Your Workforce with TechCred Learn More

Tag Archives: cybersecurity

← Older posts

5 Skills Learners Master with CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. Here are 5 skills that learners will master with CompTIA Security+ certification. #1 ATTACKS, THREATS & VULNERABILITIES Includes updated coverage of the latest threats, attacks, and vulnerabilities, such as IoT device weaknesses, […]

Tagged , , , |

Cybersecurity Best Practices – Passwords

Managing passwords is the easiest, most impactful thing you can do when it comes to IT security. (And it’s free!) RESET EVERY 3 MONTHS Windows login Email/Office 365 Routers and firewalls Other hardware Customer relationship management (CRM) Marketing automation PASSWORD MUST-HAVES Uppercase and lowercase letters Numbers Symbols – i.e . !@#$%^&*() Characteristics of a Strong […]

Tagged , , |

Master These 5 Skills with CySA+ Training

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring. CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions that covers core security analyst skills while emphasizing software and application security, automation, threat hunting, […]

Tagged , , , , , , , |

10 Common Cybersecurity Misconceptions

COMMON CYBERSECURITY MISCONCEPTIONS FOR SMALL AND MEDIUM-SIZED ORGANIZATIONS Misconception #1: My data (or the data I have access to) isn’t valuable. All data is valuable Take Action: Do an assessment of the data you create, collect, store, access, transmit and then classify all the data by level of sensitivity so you can take steps to protect […]

Tagged , , , |

5 Steps to Protecting Your Digital Home

More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which in turn can save us time and money while providing convenience and even safety. These advances in technology are […]

Tagged , |

If You Connect, You Must Protect

Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world. WHY SHOULD […]

Tagged , |

5 Ways to Be Cyber Secure at Work

Businesses face significant financial loss when a cyber attack occurs. According to the Identity Theft Resource Center, in 2018, the U.S. business sector had the largest number of data breaches ever recorded: 571 breaches. Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From […]

Tagged , , , |

Let’s Talk About Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial […]

Tagged , , |

How-to-Guide: Multi-Factor Authentication

SIMPLE TIPS TO SECURE IT Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, you should consider using multi-factor authentication, also […]

Tagged , , |

Online Privacy

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal […]

Tagged , | ← Older posts