youtube.JPGfacebook.JPGtwitter.JPGgoogleplus.jpg

800-348-5194 (Toll Free in WY)
email:WSBDC@uwyo.edu

Blog Search

How to Guard Against Spearphishing

Cybersecurity expert Jim Drever explains what spearphishing is and how to guard against it.
Copyright © 2013 University of Wyoming     If you have ever received an email telling you to verify your email address or account information, especially with an… http://www.wyomingsbdc.org/blog1/2018/05/how-guard-against-spearphishing/

How to Avoid an Email Phishing Attack

Phishing is a hacker’s easiest method of gaining access to your computer, which can be costly and time consuming. Our cyber security expert Jim Drever shows you how to avoid these mistakes.
Copyright © 2013 University of Wyoming     Phishing is a hacker’s easiest method of gaining access to your computer, network, and personal data.  Phishing is most… http://www.wyomingsbdc.org/blog1/2018/01/how-avoid-email-phishing-attack/

The Human Firewall Solution

To protect your business from cyber attacks, train yourself and your employees to be aware of the threats and become human firewalls.
Copyright © 2013 University of Wyoming   Many cyber attacks are successful because they prey on humans instead of devices. It is a lot easier for criminals to take… http://www.wyomingsbdc.org/blog1/2017/11/human-firewall-solution/

Ransomware

What ransomeware is and how you protect yourself from it
Copyright © 2013 University of Wyoming Ransomeware is a computer program (malware) that when installed and run on your computer it will encrypt almost every file on your… http://www.wyomingsbdc.org/blog1/2017/03/ransomware/