How to Identify Spam and Safe from Spoofing, Phishing and Pharming

By CRA | June 27, 2017
In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our inboxes. All the while, spammers and identity thieves developed more...

IT Security Best Practices: Saving, Sending & Sharing Files

By CRA | June 20, 2017
Information technology has become a vital part of everyday life and business.  The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure.  Here we describe strategies and IT security best practices...