3 Please read important messages

Order Confirmation Imitation

If you’ve started your holiday shopping, you may have received purchase confirmation emails from Amazon, one of the world’s most popular retailers....

Tips to Protect Against a Cyberattack

As more consumers move to online banking in the wake of the pandemic, criminals are looking for ways to take advantage of unsuspecting individuals,...

Trusted Third Parties Used as Phish Bait

Working with a third-party organization can be a great help, but what happens if that third party falls victim to a cybersecurity attack? Not only could your...

Company Size Doesn’t Matter

Think hackers are only trying to target large corporations for their cyberattacks? Think again! If you are an employee of a small to medium size business, you...

Security Tips – That’s Suspicious!

Have you ever encountered a situation at work that was suspicious? Perhaps this was a suspicious person, a suspicious email, or even a phone call that didn't...

Top 10 Cybersecurity Tips for Holiday Shopping

For most of us, the holiday season is about friends, family, food—and shopping! Unfortunately, while you’re looking for holiday deals, the bad guys are...

Steer Clear of Fake Login Pages

Grand Rapids State Bank has rolled out an update of its online banking service effective Monday, February...

Exploiting the Coronavirus: Financial Relief Scam Targeting Organizations

The coronavirus pandemic continues to impact organizations across the globe. This hardship gives cybercriminals the perfect bait: a promise of financial...

Exploiting the Coronavirus: Supermarket Spoofs

Grocery delivery services have been quite popular during the COVID-19 pandemic. These services help support social distancing, reduce the number of shoppers in...

Personally Identifiable Information (PII)

Sensitive information is privileged information which – if compromised through alteration, corruption, loss, misuse, or unauthorized disclosure – could...

Exploiting the Coronavirus: Watch Out for Fake Charities!

With the Coronavirus pandemic still raging on, people all over the world are doing what they can to help one another. The bad guys are hoping to use this...

Exploiting the Coronavirus: Phony COVID-19 Tracking

Countries around the world are developing COVID-19 tracking applications for mobile devices. These apps use digital tracking to help identify and notify users...