Cybersecurity Tip of the Week http://fcnb.ca/cybersecurity.html hourly 1 1970-01-01T00:00+00:00 Smart Home Safety http://fcnb.ca/pc_url_38862243 <div class="plain"><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><b><span style="" class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/273/2d0/0b8/2019-03-13-Smart-Home-Safety.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17951370">Smart Home Safety</font></span></b></font></p><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Hot new gadgets claim to make your home smarter, more efficient and secure. In fact, if not properly secured, these devices can be turned against you. In November 2018, a woman was stalked by her ex-boyfriend using their <a rel="" link="" target="_blank" href="https://www.cbc.ca/news/technology/tech-abuse-domestic-abuse-technology-marketplace-1.4864443" class="plainlarge">smart home technology</a>. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.cbc.ca/marketplace/episodes/2018-2019/home-hack-how-safe-are-your-high-tech-security-devices" class="plainlarge">CBC Marketplace</a> did an episode on how easily your security cameras, keyless door entries, virtual assistant devices (Alexa) and even baby monitors can easily be hacked if not properly secure. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">We are not trying to discourage you from having these devices in your home. Our goal is to motivate you to take some security steps to ensure these types of devices are safeguarded against hackers. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The first step is to ask yourself the following questions:</font></div><div class="plain"><br><ol><li class="plainlarge">What are you using the devices for? </li><li class="plainlarge">Do you feel comfortable putting a camera in your home? </li><li class="plainlarge">If this technology becomes compromised, what are the risks to you and your family? </li><li class="plainlarge">What are the security measures? </li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Before purchasing any devices, make sure that the product is purchased from a reputable company, that they allow you to change the default password and a bonus to look for would be the ability to use two-factor authentication. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How to secure your smart home devices:</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><ul><li class="plainlarge">Create a strong and unique password for each of your devices. Do not repeat the password. Choose a password that is over 16 characters long, that has special characters and would not be easily hacked. </li><li class="plainlarge">Change the password to your Wi-Fi and router. </li><li class="plainlarge">Learn to spot<a rel="" link="" target="_blank" href="http://fcnb.ca/common-investment-scams.html#phishing" class="plainlarge"> phishing emails</a>. Hackers are smart and could try to retrieve your password by sending you an email that looks like it’s being sent from your security camera’s company.</li><li class="plainlarge">Enable <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">two-factor authentication</a> when available. </li><li class="plainlarge">Consider installing a separate router dedicated to just your IoT devices for even better security. Alternatively connect them to a separate subnet (such as a guest network if your router permits it).</li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">It is up to you to learn how these devices work and how to secure them properly. </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></font><br></div> FCNB 2019-03-13T06:05:24-07:00 Smart Home Safety How to protect your data on social networks http://fcnb.ca/pc_url_38855121 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/0a9/2a8/0e3/2019-03-06-How-to-protect-your-data-on-social-networks.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="141" size="250" border="0" daid="17948218">How to protect your data on social networks</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Data Privacy day (January 28th), is an opportunity to think about what we share and who we share it with on social media. It seems obvious to keep some things private, such as phone number, credit card number, mother’s maiden name, etc., but there are many other things you can do to further your protection. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plainlarge">Check your privacy settings and consider your needs. If you use social media for work purposes, consider creating a separate account for your personal needs. </li><li class="plainlarge">Always use strong, creative, and memorable (only to you) passwords, and never share them. </li><li class="plainlarge">Keep your mobile device lock with a pin or pattern. </li><li class="plainlarge">Be sceptical of those <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">silly quizzes</a> you can find on social media (IQ, personality type, etc.). They may take you to an unsecure site. </li><li class="plainlarge">Wait until after you’ve return from your <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38508741" class="plainlarge">vacation</a> to post about it on social media. </li><li class="plainlarge">Only accept <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38400799" class="plainlarge">friend requests</a> from people you know. Even if it looks like you have friends in common, this could be a fraudster that has created a fake account trying to steal your personal information. </li><li class="plainlarge">Avoid linking your fitness apps to your social networks, such as your regular running routes. While doing fitness challenges with your friends can be motivating, you could be putting yourself at risks by publicizing when you’re not home. Share your information with friends directly, rather than in a public setting. </li></ol></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div><div class="plain"><br></div> FCNB 2019-03-06T06:00:02-08:00 How to protect your data on social networks How to create unique passwords you won’t have to memorize http://fcnb.ca/pc_url_38838356 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17940046" src='//0104.nccdn.net/1_5/1ef/10b/384/2019-02-20-How-to-create-unique-passwords.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">How to create unique passwords you won’t have to memorize</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">A strong password is the first, and one of the most important steps to protecting your personal information. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">This <a link="" target="_blank" href="https://www.cbc.ca/radio/thesundayedition/the-sunday-edition-march-18-2018-1.4579165/how-to-create-unique-passwords-you-won-t-have-to-memorize-1.4579765" class="plainlarge">CBC article</a> gives you a great method on how to create strong and unique passwords – that you don’t have to memorize. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">New guidance suggests the length of your password may be more important than how complicated its combination of letters and number are. Make sure that your password is at least 12 characters long.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-02-20T06:00:10-08:00 How to create unique passwords you won’t have to memorize Digital Romance http://fcnb.ca/pc_url_38829465 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><img width="250" align="left" src='//0104.nccdn.net/1_5/1ef/280/18d/2019-02-13-Digital-Romance.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17934680"><font style="" class="heading1">Digital Romance </font></font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Technology is changing the way we find love – with the arrival of dating apps and social networking, we can connect with more people and have more options for revealing ourselves while looking for a partner. </font>When love is in the air, people are a little more likely to click on a risky link, or open a suspicious email. </div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/newsroll.html?fb_31915481_anch=38809071" class="plainlarge">Romance scams costs New Brunswickers $353,361 in 2018</a>. To avoid being a statistic and having your heart broken this Valentine’s day, look out for the following red flags. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plain"><font style="" class="plainlarge"><b>Showered with Compliments:</b>  scammers will come across as extremely eager in the beginning, raining down compliments and asking to meet.</font></li><li class="plain"><font style="" class="plainlarge"><b>Communication method changes</b>: Scammer will quickly move away from the dating site and start texting or emailing, in case their profile page is flagged or shut down by the site. </font></li><li class="plain"><font style="" class="plainlarge"><b>Sad story:</b> once they have you interested, their sad stories will begin. An accident has happened, or they need money for some kind of emergency. </font></li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">If you are planning on joining a dating site, make sure you consider the following:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><ul><li class="plain"><font style="" class="plainlarge">Provide as little personal information as possible on your profile. </font></li><li class="plain"><font style="" class="plainlarge">Select a profile picture you haven’t used any where else. This will prevent them from doing a google image search and finding more information about you. </font></li><li class="plain"><font style="" class="plainlarge">Do some research on the person you are chatting with. You can google their name and do a reverse search on them. If they are using a stock image or someone else’s picture, you should cease communicating with them. </font></li><li class="plain"><font style="" class="plainlarge">If there is a cost to signing up, read the terms and conditions and make sure you know how to cancel your account.</font></li><li class="plain"><font style="" class="plainlarge">Only sign up to legitimate and reputable dating sites. Make sure to pay close attention to the website, as scammers often mimic real web addresses. </font></li><li class="plain"><font style="" class="plainlarge">Never give your financial details or send money on a dating site. </font></li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">As much as we all want to be swept up in the romance, remember that it is unlikely that someone will declare their undying love to you after only a few interactions. </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-02-14T04:42:34-08:00 Digital Romance What to do if your email gets hacked http://fcnb.ca/pc_url_38813530 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17927331" src='//0104.nccdn.net/1_5/2e0/1cb/27b/2019-02-06-What-do-if-your-email-gets-hacked.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">What to do if your email gets hacked</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Do you know what to do if your email account has been hacked? Many people think that changing their password is enough – it’s not! </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Here’s what you need to do to get everything back in order and keep hackers from gaining access to your account again: </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p style="" class="plain"></p><ol><li class="plain"><font style="" class="plainlarge"><b>Change your password</b><b>.</b> The first thing you should do is to stop the hacker from getting back into your account. Change your password to a strong password.</font></li><li class="plain"><font style="" class="plainlarge"><b>Reclaim your account</b><b>. </b>If you’re lucky, the hacker only logged into your account to send spam to your contacts. If you’re not so lucky, the hacker changed your password.  If that’s the case, you will need to reclaim your account by clicking “forgot your password” and answering your security questions (or backup email address).</font></li><li class="plain"><font style="" class="plainlarge"><b>Change your security questions</b>. Once you’ve reclaimed your account, take this opportunity to change your security questions.</font></li><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge"><b>Enable two-factor authentication</b></a>. </b></li><li class="plain"><font style="" class="plainlarge"><b>Check your email settings.</b><b> </b>It is possible f or hackers to have changed your settings to forward a copy of every email to themselves, so they can watch for emails containing login information. Check your mail forwarding settings to ensure no unexpected email addresses have been added. Take a look at your email signature to make sure the hacker hasn’t added a spam signature that contains links even after you’ve locked them out. Check your ‘reply to’ email addresses, this is another item that hackers can change, in which they create an email address that is similar to yours, but instead goes straight into the hacker’s email account.</font></li><li class="plain"><font style="" class="plainlarge"><b>Search for other compromises.</b> Search for the word “password” in the inbox to ensure there are no records of an email that contains this type of information.  If you do find something, change the passwords to those accounts immediately.</font></li><li class="plain"><font style="" class="plainlarge"><b>Scan your computer for malware and viruses.</b> Run a full scan with your anti-malware program to make sure the hackers haven’t gone past your inbox.</font></li></ol><p class="plain"></p> <p style="" class="plain"><font style="" class="plainlarge"><br></font></p> <p class="plain"><font style="" class="plainlarge">If the hackers have sent something on your behalf, make sure to reach out to those contacted as soon as possible to let them know that your account has been hacked. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-01-30T06:00:04-08:00 What to do if your email gets hacked Remote Desktop Protocol http://fcnb.ca/pc_url_38806506 <div class="plain"><br></div><div class="plain"><img width="250" align="left" src='//0104.nccdn.net/1_5/38a/118/24a/2019-01-30-Remote-Desktop-Protocol.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="190" size="250" border="0" daid="17924013"></div><div class="plain"><font style="" class="heading1">Remote Desktop Protocol </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain">According to a public service announcement from the FBI, since 2016 there has been a rise in cyber actors exploiting the Remote Desktop Protocol to conduct malicious activities. An example of this attack is when they drop a ransomware onto a device and execute it, effectively locking your computer/device. This type of threat demands payment in bitcoin in exchange for a decryption key. </div><div class="plain"><br></div><div class="plain"><font style="" class="customtext2"><b>What is Remote Desktop Protocol?</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Remote Desktop Protocol (RDP) is a program that is designed to allow a remote user to access a computer in a different location. For example, it allows network administrators to remotely diagnose and resolve problems individual users encounter. RDP is available for most versions of the Windows operating system. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">It also allows an individual to control the resources and data of a computer over the Internet. It provides complete control over the desktop of a remote machine by transmitting input such as a mouse movement and keystrokes and sending back a graphical user interface. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">For a connection to happen, the local and remote machines need to authenticate via a username and password. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How to protect yourself: </b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><ul><li class="plainlarge"><b>Having a strong password: </b>this is always your first line of defense. For tips on how to create a strong password, click <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">here</a>. Apply <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">two-factor authentication</a>, where possible. </li><li class="plain"><font style="" class="plainlarge"><b>Update your RDP:</b> outdated versions of RDP may use flawed CredSSP, the encryption mechanism, thus enabling a potential attack. To update your RDP, follow these simple steps:</font></li><ul><li class="plain"><font style="" class="plainlarge">Open windows update by clicking the Start button and type “Update” in the search box, then click on “Windows Update”.</font></li><li class="plain"><font style="" class="plainlarge">Click on “Check for updates” and wait until Windows looks for the latest updates for your computer. </font></li><li class="plain"><font style="" class="plainlarge">Select any pending Windows updates under the “Important and Optional” categories. </font></li><li class="plain"><font style="" class="plainlarge">Click “Install updates”. Once the updates are completed, restart your computer. Repeat the steps until no more updates are available. </font></li></ul><li class="plain"><font style="" class="plainlarge"><b>Restrict access to the default RDP</b>: Use firewalls (both software and hardware where available) to restrict access to remote desktop listening ports (default is TCP 3389). It is highly recommended to use an RDP gateway for restricting RDP access to desktops and servers. You can also use VPN software as an alternative. </font></li></ul><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></p></div> FCNB 2019-01-23T06:00:06-08:00 Remote Desktop Protocol Interesting facts about the Internet http://fcnb.ca/pc_url_38797996 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17918557" src='//0104.nccdn.net/1_5/2b5/159/321/2019-01-23-Interesting-facts-about-the-Internet.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Interesting facts about the Internet</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"></p><ul><li class="plain"><font style="" class="plainlarge">A single Google query uses 1,000 computers and takes 0.2 seconds to retrieve an answer.</font></li><li class="plain"><font style="" class="plainlarge">The inventor of the modern world wide web, Tim Berners-Lee, was knighted by Queen Elizabeth.</font></li><li class="plain"><font style="" class="plainlarge">The GIF format was invented by Steve Wilke, an engineer at Compuserve in 1987.</font></li><li class="plain"><font style="" class="plainlarge">The first spam email was sent in 1978 over ARPNET by a man named Gary Thuerk, whom has been nicknamed ‘The Father of Spam’. He was selling computers.</font></li><li class="plain"><font style="" class="plainlarge">Online daters spend an average of $243 per year on online dating.</font></li><li class="plain"><font style="" class="plainlarge">We now spend more time browsing the web on mobile devices than desktop computers.</font></li><li class="plain"><font style="" class="plainlarge">Researchers are debating on whether or not to recognize Internet addiction as a mental disorder. In China, there are treatment camps for Internet addicts.</font></li><li class="plain"><font style="" class="plainlarge">LOL used to mean “lots of love” before “laughing out loud” took its place.</font></li></ul><p class="plain"></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2019-01-16T06:19:25-08:00 Interesting facts about the Internet Baby it's cold outside - Layer up http://fcnb.ca/pc_url_38791559 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/074/2d1/1ff/2019-01-16-Baby-it-s-cold-outside.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="171" size="250" border="0" daid="17915416">Baby it’s cold outside – Layer up</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Layering up your login also known as multi-factor authentication (also known as two-factor authentication), which is a free feature available n the settings of your favorite social networks, banking site, etc. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>What is multi-factor authentication?</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Multi-factor authentication is an additional layer of protection beyond your password. It significantly decreases the risk of a hacker accessing your online accounts by combining your password with a second factor, like your mobile phone. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">There are dozens of options you can choose from to protect your accounts, but most websites rely only on a few. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are the top three types of multi-factor authentication options:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plain"><font style="" class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge"><b>Password</b></a>:</b> A strong password is your first layer of defense. With this in place, you’re ready to add an extra layer of protection. </font></li><li class="plain"><font style="" class="plainlarge"><b>Fingerprint ID: </b>Available on most smartphones and many laptops, fingerprint scanning is a great way to keep your device locked only to you. </font></li><li class="plain"><font style="" class="plainlarge"><b>Single-use code:</b> A single use code is either sent to your phone or your email address, which generally, only you have access to.  </font></li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">This extra layer of protection will keep you warm through the cold winter months and all year long.</font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div><div class="plain"><br></div> FCNB 2019-01-09T06:00:08-08:00 Baby it's cold outside - Layer up New Year’s Cybersecurity Resolutions http://fcnb.ca/pc_url_38781993 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/0f2/243/2dc/507478-PHVWNL-178.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="17912163">New Year’s Cybersecurity Resolutions</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Happy New Year! It’s the time of year when we feel the need to turn over a new leaf and create a list of goals. To help you out, we went ahead and created a list to set you on the right cybersecurity track!</font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>1. Set better passwords:</b> Having a strong password is your first line of defence! It can be very tempting to use a simple combination for every account, but choosing a strong and unique password should take priority. If you are having a hard time with keeping track of all your passwords, research a good and reputable password manager software. Make sure to never use personal information in your passwords, such as your date of birth, social insurance number, etc. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>2. Public Wi-Fi: </b>When it comes to public Wi-Fi, there is no such thing as secure Wi-Fi. Even if your local coffee shop claims it is secure, Wi-Fi networks lack encryption. Private online activity, such as online banking or shopping, should be done at home or when using a VPN that will guarantee you a safe Wi-Fi connection. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>3. Secure your social media: </b>While social media is great at connecting us with our loved ones, it is also a great way for scammers to collect your personal information and catch you in a scam – if you aren’t careful. Be mindful of what <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">you post</a> and make sure to set your settings to private on all your social networks.  </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>4. Don’t skip your updates: </b>Protect your personal information, files and money from malware by installing updates to your devices, apps and antivirus as they become available. You can set software to ‘auto-update’ so you do not miss out on the latest security features. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font></div><blockquote><div class="plain"><font style="" class="plainlarge"><b>5. Know the trending frauds:</b> Frauds and scams evolve all the time. Knowing the signs to watch for will help you be better prepared and avoid falling for scams. <a rel="" link="" target="_blank" href="http://fcnb.ca/subscribe.html" class="plainlarge">Sign up</a> for our fraud alerts to receive notifications right in your inbox. </font></div></blockquote><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Start the year off right by keeping your personal information safe from cybercriminals. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a> </font></div><div class="plain"><br><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br><br></div> FCNB 2019-01-02T06:01:27-08:00 New Year’s Cybersecurity Resolutions The Trojan horse of software http://fcnb.ca/pc_url_38770429 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><img width="250" align="left" daid="17907411" src='//0104.nccdn.net/1_5/115/1e0/0a1/2018-12-19-Trojan-horse-of-software_1.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250"><font style="" class="heading1">The Trojan horse of software</font></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><br></font></p><p class="plain"><font style="" class="plainlarge">The Trojan horse is a story most people know. Soldiers hid inside of a giant wooden horse and invaded the enemy’s castle from the inside by bursting out of it. Even though this story happened in about 500 B.C., the Trojan horse is still active today and you may be its next victim if you’re not careful. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Trojan horse or Trojan viruses are a type of computer software that hides itself as trustworthy software. It usually hides in fake antivirus tools or software to speed up or clean your computer. In reality, this software is creating a backdoor to let malicious user have access to your computer. This can let them see sensitive or personal information such as passwords, usernames, bank cards and more. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">The best way to protect yourself from Trojan viruses is to avoid downloading software from software providers that are not trusted. Software providers will never urge you to download their software for an emergency. It is also essential to have a strong anti-virus and keep all of your software up to date. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">When your software isn’t up to date, it gives these programs an easy way to exploit your computer and its weaknesses. Follow these steps and you may prevent being victimized by the next Trojan horse.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-12-19T05:59:51-08:00 The Trojan horse of software Jailbreaking your iPhone http://fcnb.ca/pc_url_38766344 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17905148" src='//0104.nccdn.net/1_5/340/3c4/2d9/2018-12-12-Jailbreaking-your-iphone.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250"><br></font></b></p></div><div class="plain"><p class="plain"><b><font style="" class="heading1">Jailbreaking your iPhone</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Jailbreaking your device may seem like a fun and exciting way to push the limits of what your iPhone or iPad is capable of. But it comes with some very serious risks that are very important to understand. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">First of all, what is jailbreaking? </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Jailbreaking consists of breaking down the walls put up by the software that Apple has put on their devices. This allows you to alter the software to further customize your device and even download apps from providers other than the apple store. These features do not come without serious consequences. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">As soon as you jailbreak your device, you throw away your device’s warranty, as Apple does not support this action. Your phone is much more likely to crash and run into more problems. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">You also step away from the safety of the boundaries that Apple has set. You leave your device open to malware, which can take your data and give it away to other third party companies or even cybercriminals. Jailbreaking is done at the user’s discretion. So when altering your devices in this way, it is important to be aware of the negatives that surround this simple modification to your everyday device.  </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="heading1"><font style="" class="plainlarge">Learn more about how to Get Cyber Safe</font></a><u></u></p><p class="plain"><br></p></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2018-12-12T05:28:28-08:00 Jailbreaking your iPhone .exe and .msi files http://fcnb.ca/pc_url_38759088 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17903459" src='//0104.nccdn.net/1_5/005/216/39d/2018-12-05-exe-and-msi-files.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">.exe and .msi files</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">When downloading files or folders on the internet, it is always important to stay vigilant. Malware can find its way onto our computers without even breaking a sweat. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">One of the most common ways that malware finds its way onto our computers is through .exe or .msi files, executable code, sometimes also known as installer files or installers. You should be aware that simply opening the .exe file will start running the code in the program and may then immediately cause the installation of malware onto your computer.   You should not run any installer or executable file which has not been obtained from a trusted source.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-12-05T06:00:09-08:00 .exe and .msi files I spy with my little eye http://fcnb.ca/pc_url_38751213 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17901156" src='//0104.nccdn.net/1_5/33b/2a0/0ea/2018-11-28-I-spy-with-my-little-eye.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">I spy with my little eye</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">If you download a great quantity of the things off of the internet, you better make sure you’re protected from spyware. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Spyware is one of the scammer’s favourite tools.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Spyware is software that uses your computer to gain knowledge about you without your consent and may even send or sell it to someone else. They can intercept your browser history, your usernames and even your passwords among other things. This can be used to target consumers in a personalised manner, sometimes targeting your interests or your needs. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">This type of software can be found in pop-up windows, when you click on certain buttons in these windows, add-ons or even masquerading as spyware removal software. To prevent spyware, it is recommended to download Malwarebytes; this is free software that can run occasional or scheduled scans for malware, spyware and trojan ware. When combined with good anti-virus software, your computer will have much stronger protection than on its own. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Do not download any software that you have been offered very suddenly and seems too good to be true. And when receiving emails, do not open attachments or click on emails or websites from people you don’t know. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-11-28T06:00:05-08:00 I spy with my little eye Make it custom http://fcnb.ca/pc_url_38743573 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17897754" src='//0104.nccdn.net/1_5/057/1d3/289/2018-11-21-Make-it-custom.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Make it custom</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">If you are downloading and installing software from any company, look for a “custom installation” option to choose. Even the most trusted companies can leave you with more than you bargained for. They will usually give you the choice between a “standard installation” and a “custom installation”. The first option has the chance of installing anything the software developer wants to. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">This can leave you with add-ons for your internet browser or even extra software you never desired on your computer and in some extreme cases, malware or spyware. When choosing the “custom installation” option, you can choose what software and which add-ons you would like to have. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">This simple choice gives you the most control over this important decision.</font></p> <p class="plain"><font style="" class="plainlarge"> </font> </p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-11-21T06:00:35-08:00 Make it custom Internet Cookies http://fcnb.ca/pc_url_38736677 <p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"><b><font style="" class="plainlarge"><img width="250" align="left" daid="17894734" src='//0104.nccdn.net/1_5/11d/16d/2b4/2018-11-14-Internet-cookies.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250"><font style="" class="heading1">Internet Cookies</font></font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Internet cookies are not delicious baked goods like the name may suggest. They are in fact small pieces of information stored on your computer’s hard drive that store certain user attributes and in some cases helps your internet browser load websites faster. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">As some browsers offer the option to not save internet cookies, some people may have questions regarding their use. Cookies are saved on your computer and removed periodically after a certain period of time. It is however, better to manually erase them from time-to-time to keep your browser running smoothly and efficiently. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Cookies are exclusive to the user, as well as the website. So your cookies will not match up with someone else’s cookies. The scariest question of all is if they can give your computer viruses, as cookies are so common. The answer is no. Cookies are simply text files to help your browser remember some information about certain websites, whilst viruses are only present in executable files such as installers, documents, music, photos and programs. However, cookies can sometimes store your personal settings for a website or even the location you have entered. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">The best thing to do is turn off the use of cookies in your browser’s settings.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font><u></u></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p> FCNB 2018-11-14T06:00:20-08:00 Internet Cookies Media Literacy Week http://fcnb.ca/pc_url_38727739 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17892107" src='//0104.nccdn.net/1_5/2d5/198/084/2018-11-07-Media-literacy-week.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Media Literacy Week</font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Not only is November Financial Literacy Month, but from November 5-9 it is Media Literacy week. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Media Literacy week is an annual event that takes place every November. Co-led by MediaSmarts and the Canadian Teachers’ Federation (CTF), the week puts a spotlight on the importance of digital and media literacy as key components in the education of youth. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">They work with Canadian schools, libraries, and educational associations and organizations that are looking to inspire a leap in Canadians’ thinking towards media education as an important – and innovative – approach for creating thoughtful, engaged and informed young people. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">They have tons of resources for teachers and for families looking to teach youth about how to be media literate. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">For more information and great resources, visit their website: <a link="" target="_blank" href="http://www.medialiteracyweek.ca/" class="plainlarge">www.medialiteracyweek.ca</a></font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">For more information on how Financial Literacy click <a link="" target="_blank" href="http://www.fcnb.ca/financial-literacy.html" class="plainlarge">here</a>.  </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2018-11-07T06:00:37-08:00 Media Literacy Week Halloween cyber security nightmares http://fcnb.ca/pc_url_38722350 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17889934" src='//0104.nccdn.net/1_5/056/2a8/384/2018-10-31-Halloween-cyber-security-nightmares.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Halloween cyber security nightmares</font></b></p> <p class="plain"><b><font style="" class="plainlarge"> </font></b></p> <p class="plain"><font style="" class="plainlarge">Halloween is usually associated with pumpkin carving, scary movies, creepy ghost stories, dreadful costumes and, of course, endless amounts of overpriced candies. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">In the spirit of Halloween, we hope that the tips below will make the Internet space a little bit less scary. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><b><font style="" class="customtext2"><b>Haunted TV specials</b></font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p> <p class="plain"><font style="" class="plainlarge">Halloween always features an abundance of horror movies on television that will give you nightmares for weeks to come. What if it your TV itself turned against you and held you for ransom? Smart TVs now have tons of different apps you can download. Make sure to always download apps from a trusted source, as these could provide an easy way in for the bad guys. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">If possible, enable app verification in your settings. An extra barrier of protection would be to ensure your wireless router is encrypted. Learn how to do that <a link="" target="_blank" href="https://www.computerworld.com/article/2547129/mobile-wireless/tutorial--how-to-set-up-wpa2-on-your-wireless-network.html" class="plainlarge">here</a>. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><b><font style="" class="customtext2"><b>I know what you did last night</b></font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p> <p class="plain"><font style="" class="plainlarge">Someone could be watching you through your webcam, without you realizing it. To learn more on how to protect yourself, read our cyber-tip <i><a link="" rel="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38605908" class="plainlarge">Yes, webcams can spy on you.</a> </i></font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><b><font style="" class="customtext2"><b>The hacker lock-picking nightmare</b></font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p> <p class="plain"><font style="" class="plainlarge">While we all love new technology, be wary of technologies that can make you vulnerable. <a link="" target="_blank" href="https://threatpost.com/bluetooth-hack-leaves-many-smart-locks-iot-devices-vulnerable/119825/" class="plainlarge">Researchers</a> have found that Bluetooth devices, including keyless entry systems, could be leaving your front door open to hackers – literally. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">If a smart lock is a must have for your home, make sure to enable the two factor authentication and choose a strong password. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><b><font style="" class="plainlarge"><b><font style="" class="customtext2"><b>When a Stranger Calls</b></font></b></font></b></p><p class="plain"><b><font style="" class="plainlarge"><b><br></b></font></b></p> <p class="plain"><font style="" class="plainlarge">Technology can truly be terrifying. We now have smart phones that can track every move we make. With access to your <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38563261" class="plainlarge">social media networks</a>, <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38549418" class="plainlarge">mobile banking</a> and <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38518824" class="plainlarge">online shopping</a>, imagine if your phone landed in the wrong hands? Scary! Setting up a two factor authentication on your accounts and having your phone locked can avoid mayhem from happening. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Happy Halloween! </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-10-31T06:00:38-07:00 Halloween cyber security nightmares Ads blocked? http://fcnb.ca/pc_url_38707315 <div class="plain"><br></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17885730" src='//0104.nccdn.net/1_5/310/000/0d8/2018-10-24-Ads-blocked.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Ads blocked?</font></b></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">If you are using the Google Chrome internet browser, Adblock is an essential add-on for you to download. Available for free, Adblock blocks any incoming ads on videos, websites and pop-ups.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">This can help you protect yourself from potential scammers and fraud, as pop-ups and ads on websites are some of the most common ways scammers will use to push their products. And, if an ad is not blocked, you simply have to click on the Adblock icon in the top right corner of your browser and select it.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Adblock will now block that advertisement for you in the future and allow you to only see what it is you want to see. One of the best methods of protection is prevention.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font><br><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></div> FCNB 2018-10-24T06:04:11-07:00 Ads blocked? Ways to improve small business cybersecurity http://fcnb.ca/pc_url_38694867 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/184/308/127/2018-10-17-Small-business-cybersecurity.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="143" size="250" border="0" daid="17881860">Ways to improve small business cybersecurity</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Happy Small Business Week! In an increasingly connected, automated and data-driven world, businesses need be extra vigilant about cybersecurity. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Did you know that 23 per cent of surveyed Canadian organizations that <a rel="" link="" target="_blank" href="https://www.statista.com/statistics/736620/canada-companies-cyber-attacks-fraud-economic-crime/" class="plainlarge">experienced a cyber-attack</a> reported having been victim of extortion as a consequence? Additionally, 31 per cent of Canadian organizations reported an estimated loss of one to fifty thousand U.S. dollars as a result of cyber-attacks, with five percent reporting <a rel="" link="" target="_blank" href="https://www.statista.com/statistics/589009/canada-companies-cybercrime-costs/" class="plainlarge">estimated losses</a> of between five and one hundred million dollars. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Use the following five tips to better defend your business against cyber-attacks. </font><font style="" class="plainlarge"><br></font><ol><li class="plain"><font style="" class="plainlarge"><b>Train Employees: </b>Your employees should be your front-line defense by participating in your small business security plan. Having a cybersecurity policy is a great way to have set rules in place for your employees to have strong passwords and protocols in case of a breach. Sourcing an outside company that specializes in cyber training is also a great way to train your employees. </font></li><li class="plain"><font style="" class="plainlarge"><b>Keep your computer and devices updated</b>: Always keep your computers, including desktops, laptops and mobile devices <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38141602" class="plainlarge">up to date</a>. </font></li><li class="plain"><font style="" class="plainlarge"><b>Back up your work:</b> All important business information should have a copy. If the information is ever stolen, or goes missing, you should have another copy somewhere. </font></li><li class="plain"><font style="" class="plainlarge"><b>Limit Access: </b>Unauthorized people should not have access to your company’s computer or accounts. Even a well-known and trusted person shouldn’t be allowed to access your computers and information. Make sure employees do not share information with your clients. Have individual logins for employees whenever possible. </font></li><li class="plain"><font style="" class="plainlarge"><b>Secure your Wi-Fi:</b> Your business’s Wi-Fi can be an easy way to access data. Make sure to secure your Wi-Fi so only employees can access it. If possible, set up a separate Wi-Fi for guests on a different network. Make sure that your employees are familiar with<a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38467969" class="plainlarge"> Wi-Fi Safety</a> when out in the public for work trips. </font></li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">You may be interested in: </font><ul><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38485435" class="plainlarge">Identifying fraudulent emails</a></li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38285457" class="plainlarge">Ransomware 101</a></li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38541217" class="plainlarge">Malware targets home and office routers</a></li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38655730" class="plainlarge">Happy Computer Checklist </a></li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><u><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html"><u>Learn more about Frauds and Scams</u></a></u></font></p><font style="" class="plainlarge"> </font><p class="plain"><u><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html"><u>See all Cybersecurity tips</u></a></u></p> <p class="plain"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx"><u>Learn more about how to Get Cyber Safe</u></a></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div><div class="plain"><br></div> FCNB 2018-10-17T06:00:09-07:00 Ways to improve small business cybersecurity Safe online banking http://fcnb.ca/pc_url_38680798 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/247/043/13e/2018-10-10-Safe-online-banking.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17877052">Safe online banking</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Online banking is a fantastic way of paying your bills and getting quick and easy access to your finances. It is also a great way for cybercriminals to attempt to steal your information. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are some of the ways they can attempt to do this:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><ul><li class="plain"><font style="" class="plainlarge"><b>Phishing:</b> cybercriminals use fake emails that look like real emails from your bank or financial institution asking you to reply with personal information.</font></li><li class="plain"><font style="" class="plainlarge"><b>Malware: </b>or malicious software is a program or file that is harmful to your computer; it can include a computer virus, spam, spyware and more. Cyber criminals use malware to get into your computer to steal your account information by capturing keystrokes or hijacking your account and transferring funds without your knowledge. </font></li><li class="plain"><font style="" class="plainlarge"><b>Pharming: </b>these attacks by cybercriminals involve redirecting your access from a legitimate website to a fake website (also known as “spoofing”), which is designed to look like the real deal. It will look very similar to your online banking site but will include extra fields, such as your mother’s maiden name, or SIN. Without realizing it, the information you think you are submitting to the bank is sent directly to the attacker.</font></li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Keep a close eye on your financial accounts regularly, the more familiar you are with your transactions, the easier it will be to spot a problem. For more tips on safe internet banking, click here. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">You may also be interested in:</font><ul><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38518824" class="plainlarge">Safe online shopping</a></li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38461336" class="plainlarge">Remember my details</a></li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38417521" class="plainlarge">HTTPS</a></li></ul></div><div class="plain"><br></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p><br></div> FCNB 2018-10-10T06:00:54-07:00 Safe online banking