July 10, 2019
Social media platforms have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post. Have your family, friends, and co-workers follow these tips to safely enjoy social media. Read more >>>
June 12, 2019
Public computers and Wi-Fi networks can now be found everywhere (airports, coffee shops, restaurants, malls, and hotels)making it easy to connect to the Internet everywhere. Our mobile devices (smartphones, laptop, tablets) enable us to get online wherever we go. And although these services are convenient in a pinch, they are not always secure So while you’re out and about this summer, using all these conveniences - stay safe by using these tips for good online security! Read more >>>
May 15, 2019
We are all familiar with home spring cleaning. But this year, consider taking some time to spring clean your digital life, too. A good digital spring cleaning can help keep your devices and information safe and secure. But it can also help improve the speed and performance of the devices and services that you use, and reduces the risk that a hacker could access old information that you’ve forgotten about. So take time to tend to your digital life and safeguard your personal information! Read more >>>
April 10, 2019
Private Information: Cyber-criminals are looking for all kinds of information that they can use, so what can we do to protect ourselves and keep our business information safe? Check out this WESTprotect Tip Sheet. Read more >>>
March 28, 2019
Do you own or use an ASUS notebook computer? You may be at risk! Read this Alert to find out what you need to know, and what steps you should take right now. Read more >>>
March 14, 2019
Social engineering is a non-technical strategy cyber attackers use that relies on human interaction and often involves tricking people into breaking standard security practices. Like convincing people to click on links or open email attachments infected with malware, persuading individuals to divulge sensitive information, or even scaring people into installing and running malware. How can you recognize when you’re being played? Read more >>>