Forms & Documents > Security Newsletters

Name Description Type Action
Disposing-of-Your-Mobile-Device How to safely and properly dispose of your old mobile device without compromising sensitive personal information that may still be within the device. File Download
Educating-Kids-on-Cyber-Safety The most common risks associated with kids using internet services, and how you can protect them. File Download
Email-Dos-and-Donts The Do's and Don'ts of day-to-day email interactions. File Download
Email-Phishing-Attacks What phishing attacks are, what they can do, and how to protect yourself from such attacks. File Download
Encryption What encryption is, the benefits of its protection, and how to implement it properly. File Download
Five-Steps-to-Staying-Secure Basic steps to keeping yourself and your information safe. File Download
Gaming-Online-Safely-Securely The unique risks posed by online gaming services, and how to practice safer gaming. File Download
Im-Hacked-Now-What How to determine if you have been hacked or if your data has been compromised, and what to do next to do about it to mitigate the negative impacts of hacking. File Download
Passphrases What makes a password "strong", and how to create one that will fully protect your data. File Download
Securely-Using-Mobile-Apps Steps you can take to securely use and maintain your favorite mobile apps. File Download
Securing-the-Cyber-Generation-Gap How different generations see cyber security, and how you can keep you information safe no matter what relative you are visiting. File Download
Securing-Your-Home-Network Steps to take to ensure that your home network is safe and secure. File Download
Securing-Your-New-Tablet The difference between securing computers and tablets, and how to keep your information safe on the go. File Download
Social-Engineering The definition of social engineering attacks, the signs, and how to protect yourself and your information. File Download
Spear-Phishing How to see the signs of these highly-targeted phishing attacks, and protect yourself from them. File Download
Staying-Secure-on-the-Road How to securely connect to the internet do you can get things done during your travels. File Download
The-End-of-Windows-XP The vulnerabilities that will occur once Windows XP becomes obsolete, and how to keep your PC protected. File Download
Using-the-Cloud-Securely The risks and benefits of cloud storage, how to pick the right one for you, and how to keep it secure. File Download
What-is-Anti-Virus How anti-virus softwares work, tips on how to use them to their full potential, and what it protects against. File Download
What-Is-Malware What is malware, who is developing it, why, and what you can do to protect your devices. File Download
Yes-You-Actually-Are-A-Target Why everyone is a target for cyber-attack, how they are being targeted, how to protect yourself and your devices. File Download