top of page
WIT WIM.png

Keeping our members engaged

in cybersecurity

About half of all emails are phish.

About one in three phishing emails get opened.

Of those, about one in ten tries to install dangerous software on the victim’s computer.

 

Text message spam is growing, too.

About one in four cases of cyber fraud now begins with a text message.

 

Check this new video for some of 

today’s most dangerous phishing emails and texts.

.

.

Websites that end in “.us” are now among the most often used by scammers. Cybersecurity expert Chris Krebs says it’s because, among many users, “.us” appears to be more credible than “.com.” But it’s not. 30,000 scam web domains ending in “.us” have been discovered in the past year.

 

Last November, the password management software company LastPass disclosed it had been breached, putting 25 million users at risk of having their most sensitive online accounts accessed by criminals. Users’ “master passwords” weren’t affected, preventing access to accounts. But now, the tech company Unciphered says there are signs that a few accounts’ master passwords have been cracked. As a safety precaution, LastPass users are advised to change their accounts' master passwords.

Following reporting by the Wall Street Journal, Google is extending the time it will provide software updates for Chromebook computers. Models made in 2021 or later — including dozens that would have become obsolete next year — will now receive software updates for at least ten years after the date of manufacture.

.

.

Sept 15 News logos.jpg
What you didnt know.jpg
about social media.jpg

What should you be on the lookout for this fall?

You’re about to find out! 

From a fast-growing scam to a fast-growing app, here we go.

communityreportcoverwit.png

The Women in Technology, Wisconsin 2022-2023 Community Report is now available for our community to view!

 

 The report outlines our 2022-2023 season event engagement data and highlights the purpose and activities of the three pillars of our organization: WIT@Work, WITonCampus, and WIT4Girls. 

 

 *Click through the flip book version of the 2022-2023 community report.

 *View a pdf of the report.

WIM Homepage.jpg

The Women in Manufacturing (WiM) Southern Wisconsin Chapter has an active base of members in and around the Milwaukee, Wisconsin area and southern Wisconsin region. Chapters provide excellent opportunities to expand your local network, build valuable business relationships, and enjoy industry-related programming.

If you are interested in any of the WiM Southern Wisconsin Chapter programs or would like to volunteer, please contact:

chapters@womeninmfg.org.

May 1 Cartoon.jpg

Engage your employees in cybersecurity year-round.

Cost-effective, easy to use, and plays well with your existing cyber program!

For information about topical videos, quizzes, posters, infographics,

and year-round cybersecurity newsletters tailored for your company, visit us at awareforce.com.

“Can facial recognition on a cell phone be activated by simply pointing the camera at a photo?”

 

No, because smartphone facial recognition uses 3-D sensors to take a scan of a person’s face in depth. A flat photo will not pass that test. Setting up facial recognition or a fingerprint to access your phone is important. Otherwise, if you lose the device, anyone who finds it can access your personal information. Unfortunately, over half of us don’t take that basic safety step. 

-----

 

“I just received an alert that someone I don’t know from another state has made me an authorized user of their credit card. Why would this be done? To improve their credit score?”

 

This is a sign of a scam. Contact the credit card issuer and ask them to remove your name from the account right away. Check your credit report from all three major credit bureaus — Equifax, Experian, and TransUnion — and check for unfamiliar accounts in your profile or suspicious activities. If something unexpected shows up, dispute the account with the credit bureaus reporting it. Consider subscribing to a credit monitoring service to keep an eye on any future unauthorized activities or putting a freeze on your credit. You’ll need to stay on guard against unexpected communications or other financial offers. And document any steps you take and save all the paperwork.

-----

 

“I received a letter from my insurance company which explained a security breach. They are offering a year of identity theft coverage services for free. Should I accept this offer?”

 

Identity theft can play out over time, even if you haven’t noticed any suspicious activities. Thieves may wait months or even years before using stolen information. Having protection in place can help detect and mitigate threats early. Since the service you’re being offered is free, there’s no financial downside to accepting it. The insurance company is likely offering this as a goodwill gesture and to mitigate potential legal consequences from the breach.

.

.

Do you have a question about cybersecurity?

Thank you for your question!

Original content © 2023 Aware Force LLC | Cybersecurity cartoon © 2023 CartoonStock

bottom of page