Recently there has been an increase in scam calls saying that they are from law enforcement in your area, whether that be the...
Information Security Corner
Safeguarding Sensitive Data through Proper Document Management
Physical copies of documents containing sensitive data are required to be disposed of properly when no longer needed to protect...
Protect Yourself: How to Safeguard Your Data on Public Wi-Fi Networks
There are estimated to be over 500 million Wi-Fi hotspots worldwide. Free public Wi-Fi possesses a large security risk as it is...
Ten Tips and Tricks on Password Security
Password security is one of the fundamentals of keeping electronic data secured, as it serves as the primary defense mechanism...
Beware the Tax Season Trap: Unraveling the Web of Phishing Email Scams
As the Tax Season rapidly approaches, it becomes imperative to remain vigilant against an upswing in tax-related scams,...
Social Media: Sharing Without Oversharing
Work is not the only place that you should be aware of potential security risks. Cybercriminals are frequently using information...
Keeping your Phone and Apps Updated
It is important to make sure that your cell phone is running on up-to-date software and has the most recent security features...
What is SMS Phising?
Cybercriminals are using text messages for phishing attacks. Like phishing emails, it is important not to click any links or...
Telehealth Program Lessons Learned Prepare CCN to Rapidly Deploy Support During Health Pandemic
After conducting a regional use case assessment for telehealth late 2018, CCN developed a telehealth program for our partner...
Security Incident Response Policy
Establishes the requirements for security incident response controls. [button...







