top of page

Security Tips for Consumers

Today’s technology creates more opportunity for your personal information to end up in the wrong hands, which can lead to fraud and ...

Threats to Cybersecurity

Malware One of the biggest threats to cybersecurity is malware, which damages or disables computers. You can unknowingly download...

Mobile Devices Security

Many consumers use portable devices to connect to the Internet. Because these devices often contain a lot of personal information, treat...

Cybersecurity (According to Ohio)

From computers to mobile devices, we are online more often and in more places than ever before. That’s why cybersecurity is so...

Laptop Security

A minor distraction is all it takes for a laptop to vanish. If it goes missing, all the valuable information stored on it may fall into...

How to Detect Malware

Monitor your computer for unusual behavior. Your computer may be infected with malware if it: slows down, crashes, or displays repeated...

How to Get Rid of Malware

If you suspect there is malware on your computer, take these steps: Stop shopping, banking, and doing other online activities that...

How to Avoid Malware

Scam artists try to trick people into clicking on links that will download viruses, spyware, and other unwanted software — often by...

Computer Security According to the FTC

Scammers, hackers and identity thieves are looking to steal your personal information - and your money. But there are steps you can take...

Protect Your Network during Mobile Access

Apps now allow you to access your home network from a mobile device. Before you do, be sure that some security features are in place. Use...

Secure Your Router

It’s also important to protect your network from attacks over the internet by keeping your router secure. Your router directs traffic...

Limit Access to Your Network

Allow only specific devices to access your wireless network. Every device that is able to communicate with a network is assigned a unique...

Use Encryption on Your Wireless Network

Once you go wireless, you should encrypt the information you send over your wireless network, so that nearby attackers can’t eavesdrop on...

Understand How a Wireless Network Works

Going wireless generally requires connecting an internet "access point" – like a cable or DSL modem – to a wireless router, which sends a...

bottom of page