Cybersecurity Tip of the Week http://fcnb.ca/cybersecurity.html hourly 1 1970-01-01T00:00+00:00 An ounce of prevention is worth a pound of cure http://fcnb.ca/pc_url_38939467 <p class="plain"></p><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/057/30a/10e/2019-05-22-An-ounce-of-prevention.jpg' style="margin: 15px 15px 15px 0px;float: left" height="141" size="250" border="0" daid="17983619">An ounce of prevention is worth a pound of cure</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Earlier this year, we explored what to do if you email gets hacked; today, we will discuss how to prevent it from happening. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>1. Find out if your email address has been compromised.</b> The first thing that we recommend is that you verify if your email address has been found in any of the hacked data sets. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">You can gain some insights into whether your email address has been found in any compromised data sets at <a rel="" link="" target="_blank" href="https://haveibeenpwned.com/" class="plainlarge">https://haveibeenpwned.com/</a> Make sure to check both your personal and work email addresses. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">If you email address shows up, you should change your password for whatever service or website is identified, to a unique password for each service as soon as possible. Make your password at least 12 characters long, the longer the better. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>2. Start using a </b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38893858" class="plainlarge"><b>password manager</b></a><b>. </b></font></div><div class="plain"><font style="" class="plainlarge"><b><br></b></font><font style="" class="plainlarge"><b>3. Turn on </b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge"><b>2-factor authentication</b></a><b> for accounts that permit it. </b></font></div><div class="plain"><font style="" class="plainlarge"><b><br></b></font><font style="" class="plainlarge"><b>4. Verify your password reset processes for important sites. </b></font><ul><li class="plainlarge">Many hackers exploit weak password reset processes to get into your account, rather than trying to hack your password directly. The next time you login to important sites, verify that your password reset processes are properly set up and secure: </li><li class="plainlarge">Make sure the email addresses they have are up-to-date, particularly any secondary email addresses. </li><li class="plainlarge">Make sure any phone numbers are up-to-date. </li><li class="plainlarge">Enable 2-factor authentication whenever possible. </li><li class="plainlarge">Avoid reset questions, the answers for which are easily determinable (such as your mother’s maiden name). If there is no other option, create a unique answer to these poor questions that only you know (for example, use your university student number as your mother’s maiden name). </li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><br></div><p class="plain"></p> FCNB 2019-05-22T06:00:28-07:00 An ounce of prevention is worth a pound of cure Online Gaming and Entertainment http://fcnb.ca/pc_url_38934056 <div class="plain"><br></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/077/0e1/16f/2019-05-29-Online-gaming-and-entertainment.jpg' style="margin: 15px 15px 15px 0px;float: left" height="176" size="250" border="0" daid="17981221">The risks of online entertainment, games and contests</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">The fun of online entertainment, games and contests can be dampened by the risks involved with these sites. But if you know the risks, you can play games online safely.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>What are the risks?</b></font><ul><li class="plainlarge">Inadvertently downloading <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s10" class="plainlarge">viruses</a>, <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s09" class="plainlarge">Trojan horses</a>, <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s12" class="plainlarge">worms</a>, and <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx#s08" class="plainlarge">spyware</a> contained in game downloads onto your computer.</li><li class="plainlarge">Dealing with fraudulent entertainment sites that require a credit card number to continue watching or playing. They may also pause the game mid-action and ask you to call a long distance number (and not hang up) in order to continue playing.</li><li class="plainlarge">Interacting with strangers who trick you into giving up personal information.</li><li class="plainlarge">Exploitation of security settings on your computer, giving criminals access to your information. This could lead to <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/prtct-yrslf/prtctn-dntty/index-en.aspx" class="plainlarge">identity theft.</a></li><li class="plainlarge">Dealing with real-world and online predators who lure you into giving them information about yourself. This could include inappropriate contact with children by predators posing as a child.</li><li class="plainlarge">Participating in a real-world marketplace in on online game (where you can buy high-level characters, for instance) could involve real-life criminals who are looking to steal your money. Only make credit card payments on sites you trust and don't send money transfers, cash or make payments outside of the site.</li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Find out more about <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/scms-frd/cntsts-en.aspx" class="plainlarge">online contest scams</a> and <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/prtct-yrslf/prtctn-dntty/gms-cntsts-en.aspx" class="plainlarge">Internet gaming</a>safety tips.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainsmall">*Blog post from <b>Cyber Safe,</b> for more information visit: <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plainsmall">https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</a></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><br></span></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><span style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></span></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div> FCNB 2019-05-15T06:00:47-07:00 Online Gaming and Entertainment Cybersecurity while traveling http://fcnb.ca/pc_url_38927679 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17979092" src='//0104.nccdn.net/1_5/3a9/0b0/1a1/2019-05-08-Cybersecurity-while-traveling.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Cybersecurity while traveling </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">When getting ready to go on a vacation or business trip, it is important to keep in mind that you are still a target for cyber criminals. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are a few tips to keep you safe during your travels:</font><font style="" class="plainlarge"><br></font><ul><li class="plainlarge">Back up the information on your computer before you travel. That way if you lose your equipment, you won’t lose all your information.</li><li class="plainlarge">Carry your portable device in an inconspicuous bag. Flashy, branded or logo bags and expensive cases draw attention to your device. Remember to never leave your device unattended.</li><li class="plainlarge">Keep in mind that Wi-Fi networks in public places like coffee shops, libraries or airports are not secure. Never send personal information through public Wi-Fi and disable the connection when you’re not using it.</li><li class="plainlarge">Don’t announce in online status updates when you’re going away on vacation, when you’ve made a big purchase or events that mention your address. You may also want to delete online posts from friends who mention these things to avoid the possibility of your home being robbed while you’re away.</li><li class="plainlarge">Be aware of the risks when tagging the location of the photos you share on social media. This lets people know where you are. If you feel the need to tag the location of a photo, a safer option would be to post the photo with the tagged location after you’re safely home.</li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a> </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><br></div> FCNB 2019-05-08T06:06:00-07:00 Cybersecurity while traveling Cyber Safe: The Internet of Things at Home http://fcnb.ca/pc_url_38919234 <div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/1d2/2a8/1e5/2019-05-01-Internet-of-things.jpg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17976717"></font></div><div class="plain"><font style="" class="heading1"><br></font></div><div class="plain"><font style="" class="heading1">Cyber Safe: The Internet of Things at Home </font></div><div class="plain"><font style="" class="heading1"><br></font></div><div class="plain"><br></div><div class="plain"><b>Internet of Things (IoT) in the Home</b></div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Entertainment systems including a television, gaming system, speakers and headphones</li><li class="plain">Heating and cooling systems such as the a thermostat, ceiling fan, carbon monoxide detector and smoke alarm, and lights</li><li class="plain">Home security systems including alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants</li><li class="plain">Smart home appliances like a refrigerator, coffee maker, oven, and vacuum</li></ul></div><div class="plain"><br></div><div class="plain"><b>loT on the Go</b></div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Connected smart cars, buses, trains, and airplanes</li><li class="plain">Wearables like a fitness tracker, watch Healthcare devices like heart and blood pressure monitors are converting to smart devices as well. Even your pet can be connected with a tracking collar.</li></ul></div><div class="plain"><br></div><div class="plain"><b>How IoT technology works</b></div><div class="plain"><br></div><div class="plain">Web-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information.</div><div class="plain"><br></div><div class="plain"><b>Why IoT is popular</b></div><div class="plain"><br></div><div class="plain">Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection.</div><div class="plain"><br></div><div class="plain"><b>What are the risks?</b></div><div class="plain"><br></div><div class="plain">With the automatic flow of information and connection between IoT devices comes a new set of cyber security risks. If you can access all your data remotely, a cybercriminal might be able to as well. The very nature of the IoT is connectivity, but with so many devices on one network, hackers could have multiple access points to your information. That's why security settings can be important. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices.</div><div class="plain"><br></div><div class="plain">Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings.</div><div class="plain"><br></div><div class="plain"><b>How a cyber attack works</b></div><div class="plain"><br></div><div class="plain">Using malware, hackers can turn devices into remote-controlled "bots”. These “bots” can be used to spread viruses and other malware, and even conduct a distributed denial-of-service (DDoS) against other systems. Once compromised, a device's camera and microphone can also be used by the hacker. In fact, some baby monitors, children's toys, as well as certain insulin pumps and pacemakers have been shown to be hackable. An added concern is that some manufacturers of smart devices reserve the right, in the terms and conditions, to store data and share it.</div><div class="plain"><br></div><div class="plain"><b>Protect yourself: #ConnectSmarter with the IoT</b></div><div class="plain"><br></div><div class="plain">As more and more everyday objects become connected IoT devices, there are simple things you can do to protect your privacy and security:</div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Change the manufacturer's default user names and use strong passwords for your Wi-Fi network and smart devices. Don't use anything that could be associated with your name, address or phone number.</li><li class="plain">Enable a lock-screen password on devices.</li><li class="plain">Use up-to-date security software on your home computer and connected devices. Update operating systems of all your devices.</li><li class="plain">To limit the damage of a cyber-attack, separate your IoT devices from your main network. Ask your service provider for help to create a ‘guest' network for your IoT devices.</li><li class="plain">Understand what personal information is being collected and why it's needed before you buy IoT devices or download apps.</li><li class="plain">Turn off geolocation when it isn't needed; if an application can see your location, a hacker could too.</li><li class="plain">Set the camera and microphone off when you are not using it.</li><li class="plain">Maintain good cyber security practices (e.g. don't open attachments from people you don't know, don't use automatic login, etc.)</li></ul></div><div class="plain"><br></div><div class="plain"><i>*Blog post from </i><b><i>Cyber Safe</i></b><i>, for more information visit: </i><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plain">https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</a> </div><div class="plain"><br></div><div class="plain"><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html"><u>Learn more about Frauds and Scams</u></a></p> <p class="plain"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html"><u>See all Cybersecurity tips</u></a></p> <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx"><u>Learn more about how to Get Cyber Safe</u></a></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-05-01T05:50:11-07:00 Cyber Safe: The Internet of Things at Home Encrypted Flash Drives http://fcnb.ca/pc_url_38911972 <p class="plain"><b><br></b></p><p class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17973400" src='//0104.nccdn.net/1_5/061/288/31d/2019-04-24-Encrypted-flash-drives.JPG' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Encrypted Flash Drives</font></p><p class="plain"><br></p><p class="plain">It can be very easy to lose a flash drive or external hard drive, especially if you are a frequent traveler.</p><p class="plain"><br></p><p class="plain">One sure way to protect your lost data from getting into the wrong hands is to store it on an encrypted flash drive/hard drive.</p><p class="plain"><b><br></b></p><p class="plain"><b>Hardware:</b> A number of manufacturers make secure flash drives that come equipped with a physical pin or fingerprint scanning.</p><p class="plain"><b><br></b></p><p class="plain"><b>Software:</b> You can use software to encrypt your external drives, making your files inaccessible to anyone without the password.</p> <p class="plain">Always make sure to do your research on any products before purchasing.</p><p class="plain"><br></p><p class="plain">You should also be careful what you plug into your computer. Never use a USB if you don’t know where it came from or what might be on it! It can be infected with malware that can even resist formatting. Don’t let curiosity get the best of you.</p><p class="plain"><br></p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plain">Learn more about Frauds and Scams</a></p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plain">See all Cybersecurity tips</a></p><p class="plain"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plain">Learn more about how to Get Cyber Safe</a></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p> FCNB 2019-04-24T04:42:23-07:00 Encrypted Flash Drives How to talk to your kids about cyber security http://fcnb.ca/pc_url_38904227 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/1a6/148/2da/2019-04-17-How-to-talk-to-your-kids-about-cyber-security.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="17969353">How to talk to your kids about cyber security</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Just about everyone is online these days, including most teenagers and a growing number of young children - never has technology been so accessible, Whether it be Snapchat, Facebook, Instagram or playing games on mobile devices, cybersecurity is becoming a concern for parents. Not only does this easy accessibility make your children vulnerable, it can also expose your computer and personal information to data breaches. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">One of the best ways to protect your children from cyber threats is to educate them about the dangers and teach them to be safe online. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are a few tips to get the conversation started:</font></div><div class="plain"><br><ul><li class="plainlarge">Talk to them about what is <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">safe to post online</a> and what’s not. </li><li class="plainlarge">Tell them to only accept <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38400799" class="plainlarge">friend requests </a>from people they know and trust. </li><li class="plainlarge">Explain that browsing to an unsecured site (http) can disclose any information being sent. It is preferred to always go to the https version of a website, if available. </li><li class="plainlarge">Teach them about <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">strong password</a> and how to properly manage them. </li><li class="plainlarge">Teach them to never leave their device unattended. You can also set passwords for their devices and set them to auto-lock after a short period of time. </li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Additionally, here are some things parents  can do to protect themselves:</font></div><div class="plain"><br><ul><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38655730" class="plainlarge"><b>Keep a clean computer</b></a></b></li><li class="plainlarge"><b>Keep your browser and antivirus up to date</b></li><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge"><b>Be aware of new frauds and scams</b></a></b>: Being aware of the type of fraud that is targeting New Brunswickers is the first line of defense of fraudsters. Teaching your children the red flags of fraud can help avoid being scammed in the future. </li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38461336" class="plainlarge"><b>Never save your credit card information</b></a>: Since most children do not have a credit card, you may think they aren’t the target of financial fraud. However, if you have a family computer, their online activities could bring on a cyberattack. Make sure to never store your credit card information, not only does this keep you safer from card fraud, it also keeps your children from buying unauthorized purchases.</li><li class="plainlarge">Make it Custom: when downloading software, look for the ‘custom installation’ feature. Even the most trusted companies can leave you with more than you bargain for. This will give you the opportunity to remove any extra unwanted add-ons. </li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-04-17T06:00:14-07:00 How to talk to your kids about cyber security Password Management http://fcnb.ca/pc_url_38893858 <div class="plain"><p class="plain"><b><font style="" class="heading1"><br></font></b></p><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17965989" src='//0104.nccdn.net/1_5/24d/223/384/2019-04-10-Password-management.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Password Management </font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">It is expected that by 2020, the average Internet user will have more than 200 online accounts. Much to the delight of cybercriminals, this is one of the main reasons why passwords like “password123” and “qwerty” are so popular. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">By using brute force or <a link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">social engineering tactics</a>, hackers can easily break into accounts guarded by weak passwords and steal whatever information they find. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">The good news is that you do not have to choose between convenience and a <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">strong password</a>. A good password management tool helps you create and store highly secure passwords and easily enter them when needed. Do your research to find a product that is right for you.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="heading1"><font style="" class="plainlarge">Learn more about how to Get Cyber Safe</font></a></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-04-10T06:00:44-07:00 Password Management Wi-Fi Safety http://fcnb.ca/pc_url_38887100 <div class="plain"><br></div><div class="plain"><br></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17962833" src='//0104.nccdn.net/1_5/14e/3b8/1eb/2019-04-03-Wi-Fi-Safety.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Wi-Fi Safety</font></b></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Information being transmitted over unsecure Wi-Fi (like in a hotel lobby or coffee shop) is vulnerable to being hijacked. Any information that you are sharing from your device particularly if you are using an unsecure connection could be obtained by cybercriminals.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Be cautious when using public Wi-Fi networks as they are not always secure. It is safest to use trusted Wi-Fi connections that are password protected. Turn off any feature which connects you to any open network.</font></p><p class="plain"><b><font style="" class="plainlarge"> </font></b><b><font style="" class="plainlarge"> </font></b></p><p class="plain"><b><font style="" class="customtext2"><b>Set up a guest Wi-Fi network</b></font></b></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Do you have family coming to stay? Are your kids’ friends constantly around? If you find yourself regularly playing the role of host, you may want to consider setting up a guest Wi-Fi network. This will allow your guests to connect to the Internet without giving them full-access to your home network. This helps reduce the risk of malware spreading and it limits what information your guests can see.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">You can set up a guest Wi-Fi network in the settings of your router, once you have logged in as an administrator, look for guest Wi-Fi network setting under “Guest Zone” or “Guest Access”, and follow the setup instructions. Please note that not all routers have this feature.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font><br><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></div> FCNB 2019-04-03T06:30:09-07:00 Wi-Fi Safety Don’t be an April Fool http://fcnb.ca/pc_url_38878760 <p class="plain"><font style="" class="plainlarge"><b><font style="" class="heading1"><br></font></b></font></p><p class="plain"><font style="" class="plainlarge"><b><font style="" class="heading1"><img width="250" align="left" daid="17959391" src='//0104.nccdn.net/1_5/2e0/258/023/2019-03-27-Dont--be-an-April-Fool.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Don’t be an April Fool</font></b></font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Be prepared, back up your files on March 31st. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>What is backup? </b>A backup is a second copy of all your important files – for example, your family photos, home videos, documents and emails. Instead of storing it all in one place (like your computer), you make another copy of everything and keep it somewhere safe. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>But why should I backup? </b>Losing your files is much more common that you’d think. Have you ever lost your phone or camera – devastating, right? One small accident or failure could destroy all the important information you care about and may need. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>How do I backup?</b> There are two common ways of backing up your files: to an external drive, or somewhere on the Internet. It’s really easy and you only need to set it up once. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <span style="" class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></span><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-03-27T06:00:09-07:00 Don’t be an April Fool March 27 is SCRUB Day http://fcnb.ca/pc_url_38869932 <div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/394/0c0/08d/2019-03-20-March-27-is-SCRUB-day.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="165" border="0" size="250" daid="17955673"><br></font></b></p><p class="plain"><b><font style="" class="heading1">March 27 is SCRUB Day</font></b></p> <p class="plain"> </p> <p class="plain">When did you last look over your social media photos and friends list?  On March 27th, participate in <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plain">Get Cyber Safe’s</a> SCRUB day. </p> <p class="plain"> </p> <p class="plain">To “SCRUB” your social media profiles, simply do the following steps:</p> <p class="plain"> </p> <p class="plain"><b>S</b>et privacy options</p><p class="plain"></p><ul><ul><li class="plain">Limit the privacy setting on your social media profiles to limit who can see your posts and photos. </li></ul></ul><p class="plain"></p><p class="plain"><br></p><p class="plain"><b>C</b>hange passwords</p><p class="plain"></p><ul><ul><li class="plain">Practice good password management. Learn how by reading our post on creating strong passwords <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plain">here</a>.</li></ul></ul><br><b>R</b>emove inappropriate posts<p class="plain"></p><p class="plain"></p><ul><ul><li class="plain">Delete posts that reveal personal information that could be used to harm you.</li></ul></ul><p class="plain"></p><p class="plain"><b><br></b></p><p class="plain"><b>U</b>ntag photos</p><p class="plain"></p><ul><ul><li class="plain">Untag yourself from photos you don’t want on your profile and ask the person tagging you to delete them.</li></ul></ul><p class="plain"></p><p class="plain"><b><br></b></p><p class="plain"><b>B</b>lock strangers</p><p class="plain"></p><ul><ul><li class="plain">Block follower requests and messages from people you don’t know. They may be fraudsters trying to steal your personal information.</li></ul></ul><p class="plain"></p><p class="plain"> </p><p class="plain"> </p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></p></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div> FCNB 2019-03-20T06:08:05-07:00 March 27 is SCRUB Day Smart Home Safety http://fcnb.ca/pc_url_38862243 <div class="plain"><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><b><span style="" class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/273/2d0/0b8/2019-03-13-Smart-Home-Safety.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17951370">Smart Home Safety</font></span></b></font></p><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Hot new gadgets claim to make your home smarter, more efficient and secure. In fact, if not properly secured, these devices can be turned against you. In November 2018, a woman was stalked by her ex-boyfriend using their <a rel="" link="" target="_blank" href="https://www.cbc.ca/news/technology/tech-abuse-domestic-abuse-technology-marketplace-1.4864443" class="plainlarge">smart home technology</a>. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.cbc.ca/marketplace/episodes/2018-2019/home-hack-how-safe-are-your-high-tech-security-devices" class="plainlarge">CBC Marketplace</a> did an episode on how easily your security cameras, keyless door entries, virtual assistant devices (Alexa) and even baby monitors can easily be hacked if not properly secure. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">We are not trying to discourage you from having these devices in your home. Our goal is to motivate you to take some security steps to ensure these types of devices are safeguarded against hackers. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The first step is to ask yourself the following questions:</font></div><div class="plain"><br><ol><li class="plainlarge">What are you using the devices for? </li><li class="plainlarge">Do you feel comfortable putting a camera in your home? </li><li class="plainlarge">If this technology becomes compromised, what are the risks to you and your family? </li><li class="plainlarge">What are the security measures? </li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Before purchasing any devices, make sure that the product is purchased from a reputable company, that they allow you to change the default password and a bonus to look for would be the ability to use two-factor authentication. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How to secure your smart home devices:</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><ul><li class="plainlarge">Create a strong and unique password for each of your devices. Do not repeat the password. Choose a password that is over 16 characters long, that has special characters and would not be easily hacked. </li><li class="plainlarge">Change the password to your Wi-Fi and router. </li><li class="plainlarge">Learn to spot<a rel="" link="" target="_blank" href="http://fcnb.ca/common-investment-scams.html#phishing" class="plainlarge"> phishing emails</a>. Hackers are smart and could try to retrieve your password by sending you an email that looks like it’s being sent from your security camera’s company.</li><li class="plainlarge">Enable <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">two-factor authentication</a> when available. </li><li class="plainlarge">Consider installing a separate router dedicated to just your IoT devices for even better security. Alternatively connect them to a separate subnet (such as a guest network if your router permits it).</li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">It is up to you to learn how these devices work and how to secure them properly. </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></font><br></div> FCNB 2019-03-13T06:05:24-07:00 Smart Home Safety How to protect your data on social networks http://fcnb.ca/pc_url_38855121 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/0a9/2a8/0e3/2019-03-06-How-to-protect-your-data-on-social-networks.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="141" size="250" border="0" daid="17948218">How to protect your data on social networks</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Data Privacy day (January 28th), is an opportunity to think about what we share and who we share it with on social media. It seems obvious to keep some things private, such as phone number, credit card number, mother’s maiden name, etc., but there are many other things you can do to further your protection. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plainlarge">Check your privacy settings and consider your needs. If you use social media for work purposes, consider creating a separate account for your personal needs. </li><li class="plainlarge">Always use strong, creative, and memorable (only to you) passwords, and never share them. </li><li class="plainlarge">Keep your mobile device lock with a pin or pattern. </li><li class="plainlarge">Be sceptical of those <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">silly quizzes</a> you can find on social media (IQ, personality type, etc.). They may take you to an unsecure site. </li><li class="plainlarge">Wait until after you’ve return from your <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38508741" class="plainlarge">vacation</a> to post about it on social media. </li><li class="plainlarge">Only accept <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38400799" class="plainlarge">friend requests</a> from people you know. Even if it looks like you have friends in common, this could be a fraudster that has created a fake account trying to steal your personal information. </li><li class="plainlarge">Avoid linking your fitness apps to your social networks, such as your regular running routes. While doing fitness challenges with your friends can be motivating, you could be putting yourself at risks by publicizing when you’re not home. Share your information with friends directly, rather than in a public setting. </li></ol></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div><div class="plain"><br></div> FCNB 2019-03-06T06:00:02-08:00 How to protect your data on social networks How to create unique passwords you won’t have to memorize http://fcnb.ca/pc_url_38838356 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17940046" src='//0104.nccdn.net/1_5/1ef/10b/384/2019-02-20-How-to-create-unique-passwords.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">How to create unique passwords you won’t have to memorize</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">A strong password is the first, and one of the most important steps to protecting your personal information. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">This <a link="" target="_blank" href="https://www.cbc.ca/radio/thesundayedition/the-sunday-edition-march-18-2018-1.4579165/how-to-create-unique-passwords-you-won-t-have-to-memorize-1.4579765" class="plainlarge">CBC article</a> gives you a great method on how to create strong and unique passwords – that you don’t have to memorize. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">New guidance suggests the length of your password may be more important than how complicated its combination of letters and number are. Make sure that your password is at least 12 characters long.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-02-20T06:00:10-08:00 How to create unique passwords you won’t have to memorize Digital Romance http://fcnb.ca/pc_url_38829465 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><img width="250" align="left" src='//0104.nccdn.net/1_5/1ef/280/18d/2019-02-13-Digital-Romance.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17934680"><font style="" class="heading1">Digital Romance </font></font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Technology is changing the way we find love – with the arrival of dating apps and social networking, we can connect with more people and have more options for revealing ourselves while looking for a partner. </font>When love is in the air, people are a little more likely to click on a risky link, or open a suspicious email. </div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/newsroll.html?fb_31915481_anch=38809071" class="plainlarge">Romance scams costs New Brunswickers $353,361 in 2018</a>. To avoid being a statistic and having your heart broken this Valentine’s day, look out for the following red flags. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plain"><font style="" class="plainlarge"><b>Showered with Compliments:</b>  scammers will come across as extremely eager in the beginning, raining down compliments and asking to meet.</font></li><li class="plain"><font style="" class="plainlarge"><b>Communication method changes</b>: Scammer will quickly move away from the dating site and start texting or emailing, in case their profile page is flagged or shut down by the site. </font></li><li class="plain"><font style="" class="plainlarge"><b>Sad story:</b> once they have you interested, their sad stories will begin. An accident has happened, or they need money for some kind of emergency. </font></li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">If you are planning on joining a dating site, make sure you consider the following:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><ul><li class="plain"><font style="" class="plainlarge">Provide as little personal information as possible on your profile. </font></li><li class="plain"><font style="" class="plainlarge">Select a profile picture you haven’t used any where else. This will prevent them from doing a google image search and finding more information about you. </font></li><li class="plain"><font style="" class="plainlarge">Do some research on the person you are chatting with. You can google their name and do a reverse search on them. If they are using a stock image or someone else’s picture, you should cease communicating with them. </font></li><li class="plain"><font style="" class="plainlarge">If there is a cost to signing up, read the terms and conditions and make sure you know how to cancel your account.</font></li><li class="plain"><font style="" class="plainlarge">Only sign up to legitimate and reputable dating sites. Make sure to pay close attention to the website, as scammers often mimic real web addresses. </font></li><li class="plain"><font style="" class="plainlarge">Never give your financial details or send money on a dating site. </font></li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">As much as we all want to be swept up in the romance, remember that it is unlikely that someone will declare their undying love to you after only a few interactions. </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-02-14T04:42:34-08:00 Digital Romance What to do if your email gets hacked http://fcnb.ca/pc_url_38813530 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17927331" src='//0104.nccdn.net/1_5/2e0/1cb/27b/2019-02-06-What-do-if-your-email-gets-hacked.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">What to do if your email gets hacked</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Do you know what to do if your email account has been hacked? Many people think that changing their password is enough – it’s not! </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Here’s what you need to do to get everything back in order and keep hackers from gaining access to your account again: </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p style="" class="plain"></p><ol><li class="plain"><font style="" class="plainlarge"><b>Change your password</b><b>.</b> The first thing you should do is to stop the hacker from getting back into your account. Change your password to a strong password.</font></li><li class="plain"><font style="" class="plainlarge"><b>Reclaim your account</b><b>. </b>If you’re lucky, the hacker only logged into your account to send spam to your contacts. If you’re not so lucky, the hacker changed your password.  If that’s the case, you will need to reclaim your account by clicking “forgot your password” and answering your security questions (or backup email address).</font></li><li class="plain"><font style="" class="plainlarge"><b>Change your security questions</b>. Once you’ve reclaimed your account, take this opportunity to change your security questions.</font></li><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge"><b>Enable two-factor authentication</b></a>. </b></li><li class="plain"><font style="" class="plainlarge"><b>Check your email settings.</b><b> </b>It is possible f or hackers to have changed your settings to forward a copy of every email to themselves, so they can watch for emails containing login information. Check your mail forwarding settings to ensure no unexpected email addresses have been added. Take a look at your email signature to make sure the hacker hasn’t added a spam signature that contains links even after you’ve locked them out. Check your ‘reply to’ email addresses, this is another item that hackers can change, in which they create an email address that is similar to yours, but instead goes straight into the hacker’s email account.</font></li><li class="plain"><font style="" class="plainlarge"><b>Search for other compromises.</b> Search for the word “password” in the inbox to ensure there are no records of an email that contains this type of information.  If you do find something, change the passwords to those accounts immediately.</font></li><li class="plain"><font style="" class="plainlarge"><b>Scan your computer for malware and viruses.</b> Run a full scan with your anti-malware program to make sure the hackers haven’t gone past your inbox.</font></li></ol><p class="plain"></p> <p style="" class="plain"><font style="" class="plainlarge"><br></font></p> <p class="plain"><font style="" class="plainlarge">If the hackers have sent something on your behalf, make sure to reach out to those contacted as soon as possible to let them know that your account has been hacked. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-01-30T06:00:04-08:00 What to do if your email gets hacked Remote Desktop Protocol http://fcnb.ca/pc_url_38806506 <div class="plain"><br></div><div class="plain"><img width="250" align="left" src='//0104.nccdn.net/1_5/38a/118/24a/2019-01-30-Remote-Desktop-Protocol.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="190" size="250" border="0" daid="17924013"></div><div class="plain"><font style="" class="heading1">Remote Desktop Protocol </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain">According to a public service announcement from the FBI, since 2016 there has been a rise in cyber actors exploiting the Remote Desktop Protocol to conduct malicious activities. An example of this attack is when they drop a ransomware onto a device and execute it, effectively locking your computer/device. This type of threat demands payment in bitcoin in exchange for a decryption key. </div><div class="plain"><br></div><div class="plain"><font style="" class="customtext2"><b>What is Remote Desktop Protocol?</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Remote Desktop Protocol (RDP) is a program that is designed to allow a remote user to access a computer in a different location. For example, it allows network administrators to remotely diagnose and resolve problems individual users encounter. RDP is available for most versions of the Windows operating system. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">It also allows an individual to control the resources and data of a computer over the Internet. It provides complete control over the desktop of a remote machine by transmitting input such as a mouse movement and keystrokes and sending back a graphical user interface. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">For a connection to happen, the local and remote machines need to authenticate via a username and password. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How to protect yourself: </b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><ul><li class="plainlarge"><b>Having a strong password: </b>this is always your first line of defense. For tips on how to create a strong password, click <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">here</a>. Apply <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">two-factor authentication</a>, where possible. </li><li class="plain"><font style="" class="plainlarge"><b>Update your RDP:</b> outdated versions of RDP may use flawed CredSSP, the encryption mechanism, thus enabling a potential attack. To update your RDP, follow these simple steps:</font></li><ul><li class="plain"><font style="" class="plainlarge">Open windows update by clicking the Start button and type “Update” in the search box, then click on “Windows Update”.</font></li><li class="plain"><font style="" class="plainlarge">Click on “Check for updates” and wait until Windows looks for the latest updates for your computer. </font></li><li class="plain"><font style="" class="plainlarge">Select any pending Windows updates under the “Important and Optional” categories. </font></li><li class="plain"><font style="" class="plainlarge">Click “Install updates”. Once the updates are completed, restart your computer. Repeat the steps until no more updates are available. </font></li></ul><li class="plain"><font style="" class="plainlarge"><b>Restrict access to the default RDP</b>: Use firewalls (both software and hardware where available) to restrict access to remote desktop listening ports (default is TCP 3389). It is highly recommended to use an RDP gateway for restricting RDP access to desktops and servers. You can also use VPN software as an alternative. </font></li></ul><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></p></div> FCNB 2019-01-23T06:00:06-08:00 Remote Desktop Protocol Interesting facts about the Internet http://fcnb.ca/pc_url_38797996 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17918557" src='//0104.nccdn.net/1_5/2b5/159/321/2019-01-23-Interesting-facts-about-the-Internet.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Interesting facts about the Internet</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"></p><ul><li class="plain"><font style="" class="plainlarge">A single Google query uses 1,000 computers and takes 0.2 seconds to retrieve an answer.</font></li><li class="plain"><font style="" class="plainlarge">The inventor of the modern world wide web, Tim Berners-Lee, was knighted by Queen Elizabeth.</font></li><li class="plain"><font style="" class="plainlarge">The GIF format was invented by Steve Wilke, an engineer at Compuserve in 1987.</font></li><li class="plain"><font style="" class="plainlarge">The first spam email was sent in 1978 over ARPNET by a man named Gary Thuerk, whom has been nicknamed ‘The Father of Spam’. He was selling computers.</font></li><li class="plain"><font style="" class="plainlarge">Online daters spend an average of $243 per year on online dating.</font></li><li class="plain"><font style="" class="plainlarge">We now spend more time browsing the web on mobile devices than desktop computers.</font></li><li class="plain"><font style="" class="plainlarge">Researchers are debating on whether or not to recognize Internet addiction as a mental disorder. In China, there are treatment camps for Internet addicts.</font></li><li class="plain"><font style="" class="plainlarge">LOL used to mean “lots of love” before “laughing out loud” took its place.</font></li></ul><p class="plain"></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2019-01-16T06:19:25-08:00 Interesting facts about the Internet Baby it's cold outside - Layer up http://fcnb.ca/pc_url_38791559 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/074/2d1/1ff/2019-01-16-Baby-it-s-cold-outside.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="171" size="250" border="0" daid="17915416">Baby it’s cold outside – Layer up</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Layering up your login also known as multi-factor authentication (also known as two-factor authentication), which is a free feature available n the settings of your favorite social networks, banking site, etc. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>What is multi-factor authentication?</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Multi-factor authentication is an additional layer of protection beyond your password. It significantly decreases the risk of a hacker accessing your online accounts by combining your password with a second factor, like your mobile phone. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">There are dozens of options you can choose from to protect your accounts, but most websites rely only on a few. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are the top three types of multi-factor authentication options:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plain"><font style="" class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge"><b>Password</b></a>:</b> A strong password is your first layer of defense. With this in place, you’re ready to add an extra layer of protection. </font></li><li class="plain"><font style="" class="plainlarge"><b>Fingerprint ID: </b>Available on most smartphones and many laptops, fingerprint scanning is a great way to keep your device locked only to you. </font></li><li class="plain"><font style="" class="plainlarge"><b>Single-use code:</b> A single use code is either sent to your phone or your email address, which generally, only you have access to.  </font></li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">This extra layer of protection will keep you warm through the cold winter months and all year long.</font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div><div class="plain"><br></div> FCNB 2019-01-09T06:00:08-08:00 Baby it's cold outside - Layer up New Year’s Cybersecurity Resolutions http://fcnb.ca/pc_url_38781993 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/0f2/243/2dc/507478-PHVWNL-178.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="17912163">New Year’s Cybersecurity Resolutions</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Happy New Year! It’s the time of year when we feel the need to turn over a new leaf and create a list of goals. To help you out, we went ahead and created a list to set you on the right cybersecurity track!</font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>1. Set better passwords:</b> Having a strong password is your first line of defence! It can be very tempting to use a simple combination for every account, but choosing a strong and unique password should take priority. If you are having a hard time with keeping track of all your passwords, research a good and reputable password manager software. Make sure to never use personal information in your passwords, such as your date of birth, social insurance number, etc. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>2. Public Wi-Fi: </b>When it comes to public Wi-Fi, there is no such thing as secure Wi-Fi. Even if your local coffee shop claims it is secure, Wi-Fi networks lack encryption. Private online activity, such as online banking or shopping, should be done at home or when using a VPN that will guarantee you a safe Wi-Fi connection. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>3. Secure your social media: </b>While social media is great at connecting us with our loved ones, it is also a great way for scammers to collect your personal information and catch you in a scam – if you aren’t careful. Be mindful of what <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">you post</a> and make sure to set your settings to private on all your social networks.  </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>4. Don’t skip your updates: </b>Protect your personal information, files and money from malware by installing updates to your devices, apps and antivirus as they become available. You can set software to ‘auto-update’ so you do not miss out on the latest security features. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>5. Know the trending frauds:</b> Frauds and scams evolve all the time. Knowing the signs to watch for will help you be better prepared and avoid falling for scams. <a rel="" link="" target="_blank" href="http://fcnb.ca/subscribe.html" class="plainlarge">Sign up</a> for our fraud alerts to receive notifications right in your inbox. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Start the year off right by keeping your personal information safe from cybercriminals. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a> </font></div><div class="plain"><br><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br><br></div> FCNB 2019-01-02T06:01:27-08:00 New Year’s Cybersecurity Resolutions The Trojan horse of software http://fcnb.ca/pc_url_38770429 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><img width="250" align="left" daid="17907411" src='//0104.nccdn.net/1_5/115/1e0/0a1/2018-12-19-Trojan-horse-of-software_1.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250"><font style="" class="heading1">The Trojan horse of software</font></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><br></font></p><p class="plain"><font style="" class="plainlarge">The Trojan horse is a story most people know. Soldiers hid inside of a giant wooden horse and invaded the enemy’s castle from the inside by bursting out of it. Even though this story happened in about 500 B.C., the Trojan horse is still active today and you may be its next victim if you’re not careful. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Trojan horse or Trojan viruses are a type of computer software that hides itself as trustworthy software. It usually hides in fake antivirus tools or software to speed up or clean your computer. In reality, this software is creating a backdoor to let malicious user have access to your computer. This can let them see sensitive or personal information such as passwords, usernames, bank cards and more. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">The best way to protect yourself from Trojan viruses is to avoid downloading software from software providers that are not trusted. Software providers will never urge you to download their software for an emergency. It is also essential to have a strong anti-virus and keep all of your software up to date. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">When your software isn’t up to date, it gives these programs an easy way to exploit your computer and its weaknesses. Follow these steps and you may prevent being victimized by the next Trojan horse.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-12-19T05:59:51-08:00 The Trojan horse of software