Facebook Social Icon Facebook Social Icon You Tube Social Icon

Technology and Innovation

Phone: 913-715-1500

111 S Cherry, Suite 3100, Olathe KS 66061

Cyber Security News

Newsletters in mailbox

March 2015 Avoiding Online Tax Scams - It’s tax season, which means it’s also time for tax scams, with numerous online scams that attempt to steal people’s tax refunds, bank accounts, or identities. Last year, the Internal Revenue Service (IRS) estimates it paid $5.2 billion in fraudulent identity theft refunds in filing season 2013.   Websense Security Labs reported in 2014 it saw approximately 100,000 IRS-related scams in circulation every two weeks.

February 2015 Protecting Against Cyber Crime - Cybercrime is any violation of federal, state, or local statute, or malicious or suspicious activity, in which a computer, network or device is an integral component of the violation. Examples can include: a malicious cyber criminal breaking into a computer to steal information (computer intrusion) or to change a website (website defacement); malware being placed on a computer without the owner’s permission; and that malware using that computer’s resources to send spam.

January 2015 - 2015 Cyber Security Outlook - We’ve asked experts at the Center for Internet Security (CIS) to share their thoughts on what issues we’ll be talking about and dealing with in 2015. Below are some highlights of those topics. To read more from CIS experts about this year’s trends and threats, visit the CIS blog.

November 2014 Online Shopping Tips - The holidays are right around the corner and consumers are being bombarded with ads for discounted merchandise, free shipping and other special deals during the holiday season, and in particular for Black Friday and Cyber Monday. Last year, more than $1.7 billion was spent online on Cyber Monday, making it the highest volume day in history for online sales.  Online sales are expected to be significant again this year.

September 2014 Social Media Scams - Spot Them Beforehand - The use of social media has exploded, with 255 million active users on Twitter and more than 1.2 billon on Facebook. Unfortunately, so too have the scams and attacks that target social media. Criminals are taking advantage of the increasing number of users and the enormous amount of information exchanged.

August 2014 Secure Online Banking - Virtually every financial institution is using the Internet to communicate and allow customers to conduct transactions online. Customers today expect this convenience, and if done securely, these transactions can be as safe as those conducted in person.

July 2014 Cyber Security and Your Summer Vacation - The summer vacation season is underway and for many of us that means lounging on sunny beaches, reading a book under a shade tree or hitting the road for a new adventure. It  can also mean identity theft and other crimes if we aren’t careful about our online activities and protecting our information. Cyber crime does not take a summer vacation; we need to remain vigilant.

June 2014 Bots, Botnets, and Zombies - You have probably heard terms such as “bots,” “zombies,” and “botnets” in recent news stories about data breaches and other cyber security risks. But what exactly are they, how do they work, and what damage can they cause?

May 2014 Protecting Against Mobile Malware - The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that there were more than two million new mobile malware samples in 2013. Symantec reports that nearly 40% of mobile device users have experienced mobile cyber crime in the past 12 months. Some experts estimate that nearly 10% of applications sold on particular platforms are malicious.

April 2014 Hacked! Now What - Maybe you opened an e-mail attachment you shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Or perhaps you’re running an out-of-date, or unpatched, operating system software (such as Windows XP) and have started to see “antivirus warnings.” Perhaps your bank called, informing you that there has been some unusual activity on your account. Your friends and family may start complaining about spam messages they are purportedly receiving from you. These are all signs that your computer may have been hacked.

March 2014 Protect Yourself From Online Tax Scams - Tax season is in full swing and criminals are seizing the opportunity for scams. Because of the recent major data breaches we’ve seen in the past few months, which exposed sensitive information on a large scale, we should be even more vigilant about taking steps to minimize our risk of ID theft and other online-related crime. Don't become the next victim.

February 2014 Personal Backup and Recovery of Your Data - Backups of computers, laptops and other devices are important defense layers in recovering from intentional or unintentional loss or corruption of data. For example, critical information can be lost when your hard drive becomes corrupted; natural disasters can destroy your equipment and device; or malware could infect your computer or device and corrupt your data. With a solid backup and recovery plan, you have a greater chance of recovering from any of these scenarios; without one, those chances are significantly diminished.

January 2014 Cyber Security Outlook - As we look ahead toward the cyber threats facing us this year, some key challenges will result from the advancements in technology that are becoming part of our daily lives. Ranging from the Internet of Things to online currencies, devices and systems have never been more interconnected.

Cyber Security News Archive