Protecting Yourself on Vacation

blog-tags
Author Image
by: Kitty T., Marketing Coordinator
Whether your spring break is in full swing, or you're getting back to your routine after a trip, it's important to be aware of how to protect yourself before, during, and after a vacation. Vacations give thieves and fraudsters opportunity to take advantage of empty homes and high spending. To truly have…

Brush Up On Your Data Security Vocabulary

blog-tags
Author Image
by: Saadia M., Director of Enterprise Risk & Chief Information Security Officer
Getting to know data security terminology is just another way to prepare and protect yourself from scammers. Check out some key terms below! Phishing: Unsolicited emails containing malicious content, including links to websites Spear Phishing: Personalized emails, indicting a level of research on the target was performed to help ensure the email appears legitimate…

Businesses: Three Great Ways to Give Back

blog-tags
Author Image
by: Kitty T., Marketing Coordinator
While it may be obvious that it is important to give back to your community through philanthropy and volunteer-work, it’s not always easy to know how. Finding a cause that is meaningful to your organization, and creating a spirit of giving is just the start. Here are three tips on…

Businesses: Why Give Back?

blog-tags
Author Image
by: Kitty T., Marketing Coordinator
They say that you get what you give, and this holds true with corporate philanthropy. Besides the obvious benefits of giving, like helping the world be better and those warm fuzzy feelings, your company will benefit tangibly when it gives back. Read on to find out three great benefits of…

Protecting Yourself from Data Breaches

blog-tags
Author Image
by: Saadia M., Director of Enterprise Risk & Chief Information Security Officer
There have been a number of high-profile breaches recently including: Marriott International announced a breach of their Starwood Guest Reservation Database has exposed personal information of up to 500 million customers. The hackers accessed names, addresses, phone numbers, email addresses, passport numbers, dates of birth, gender, loyalty program account information, and reservation information. For some, they also stole encrypted…