The shift to BYOD

Public Sector Marketing 2.0

The purpose of this training would be to make employees aware of the technological risks associated with digital engagement and the latest malicious techniques being used by hackers such as: Use of social networking sites to enumerate users.

New Scams Claiming to Be the IRS - Aim for Nonprofits

Seeking Grant Money Today

Using a technique calculated to get almost anyone’s attention, the e-mail notifies the recipient that his or her tax return will be audited. Most scam e-mails seen by the IRS are sent using the same technique used by spammers, in which hundreds of thousands of messages are sent to potential victims based on Internet address. More information on identity theft, phishing and telephone scams using the IRS name, logo or spoofed (copied) Web site is available on this Web site.