After completing my cyber security training, I have recieved this certificate as shown on the left. I will be providing you with information based on identity theft and malware, all sourced within the news.
Within this article, you can see a case where identity theft had taken place on a Portland resident. The Portland woman, Del Prado saw countless of loans being applied under her name. Without consent, it all came out to be her wife, now ex-wife. Her ex- wife who she thought she knew so dearly was stealing her identity and stealing thousands of dollars from her. This just shows to us that it can happen to anybody weather or not you think your personal information is secured. We can potentially protect ourselves from these types of situations by protecting personal information, shredding documents with information before you throw them away, monitoring all of your accounts, checking bank statements on a regular basis, and securing your devices, updating them with the latest software.
Published by OPB New's outlet, October 2024. Accurate. Purpose is too inform audience of possible situations.
Malware is any program that is harmful with intentions. It can steal your data, harm your files, or even lock you out of things. 15 different types of malware attacks are presented in the article linked below. It can happen anywhere at any time. Pretty much anybody can be affected by these attacks but thy most commonly affect individuals who use devices for personal and work use, businesses, government agencies, educational institutions, and healthcare organizations. Preventing these attacks can be as simple as updating your software constantly, using software that offers antivirus programs, using strong passwords, and backing up your data.
15 infamous malware attacks: The first and the worst | CSO Online
Published by John Leyden and Josh Fruhlinger in august of 2024 on CSO's website. Written to educate audience on malware attacks and the different types.