What are some best practices for avoiding current and new security threats?

Nobody wants to acknowledge it, but it’s true… Hackers are getting smarter and far more creative with the methods they use to try to acquire your trust, sensitive information, and money. The methods they now employ go far beyond their attempts to install malware on your computer or device. There is a growing trend toward mimicking legitimate companies and their websites to gain your confidence and entice you to reveal information you would never should to even a perceived “trusted” source. Many recognize the Nigerian 419 e-mail scam as the beginning of the modern confidence game, playing on trust and promises of untold riches, even skeptical people fell victim to it in greater numbers than anyone could believe. Recently, a particularly nasty piece of malware called “CryptoLocker” encrypted infected users files and demanded a $300 to $1,000 payment to provide … READ MORE »