Zelle is an easy way to send money instantly. The convenience features of repaying someone for lunch, sending money to a friend or family member and the benefit of not having to carry cash around are great. However, attackers also...
Current Trend: Attackers targeting customers’ MFA codes
There are many ways you can be victimized by cybercriminals. Currently, we are seeing attackers use this MFA attack on their victims. Read more below on how this works and what you can do to protect yourself. MFA Attack Always...
Phishing emails are still effective
There are many ways you can be victimized by cybercriminals. In 2022, remote tech-support scams, promises of returned money by only sending a few dollars and lottery scams are prevalent too. However, phishing emails remain one of the top ways...
Protection from scams involving virtual phone numbers
We all know, and get, those annoying robo-calls offering to sell us a car warranty, pay our utility bill, or advise us that we have won a sweepstakes. However, do we have the same feeling of “this is a scam”...
2022 Cybersecurity Trends
Cybersecurity is a term with which we are all familiar. Cybersecurity has many technical definitions but simply put, it means protecting information from unauthorized use, alteration and access. According to cybermagazine.com, cybersecurity first emerged in the 1970s when researcher Bob...
Safe Online Shopping
If you are like me, you love shopping online! Ease of use, comparisons of different products, good deals, and plenty of reviews are just some of the benefits from shopping online. If I am not careful, I can spend lots...
#BanksNeverAskThat
I am excited to announce that Wilson Bank & Trust has partnered with the American Bankers Association (ABA) and other banks across the country in the national #BanksNeverAskThat campaign. This is a national campaign designed around the annual October Cybersecurity...
MFA – Multifactor Authentication benefits
Recently, I wrote about how attackers often target a user’s username and password to gain access to sensitive information. Indeed, by simply getting access to the login credentials, the attacker will have access to the user’s account. Think about it...
Protect those credentials – Keep your username and password secure
Did you know? Cyber Criminals often go after usernames and passwords first because they are easier to get. Once an attacker has your username and password, this allows them, the criminal, to bypass IT security controls. Think about it, if...
Secure your mobile devices
Did you know? The term “mobile devices” means more than just our cell phones; it includes tablets, wearables like watches, and now “smart devices” – all of those gadgets we connect to our networks at home (think thermostats, refrigerators, TVs...