Cybersecurity Blog

Don’t Miss the Call on Call-Back Fraud: Understanding TOAD Attacks
Posted on Jan 30th, 2026

You’ve probably gotten pretty good at spotting phishing emails. That suspicious link? You’re not clicking it. That urgent message from your “bank”? You’re checking the

Read More
Secure Your New Apple Device: 5 Essential Privacy and Security Settings to Configure Right Now
Posted on Dec 24th, 2025

Many of you may find a new Apple iPhone under the tree this year. However, Apple devices often come with default settings that prioritize convenience

Read More
Don’t Fall for the Voice: How to Spot and Stop Phone-Based Social Engineering Attacks
Posted on Sep 1st, 2025

Your phone rings, displaying your bank’s name on the caller ID. The caller’s voice is professional and urgent, stating “We’ve observed suspicious activity on your

Read More
Scammers Are Abusing Church Directories – Here’s How to Protect Yourself
Posted on Aug 12th, 2025

Nothing is out of bounds for scammers, and now they’re targeting churches and the people in them. One way they do this is by using

Read More
There’s nothing fake about synthetic identity theft
Posted on Jun 10th, 2025

A bank customer recently shared that their identity theft monitoring service alerted them that their Social Security number had been discovered online, linked to an

Read More