Categories
Featured Meeting Needs Staying Secure

Skyrocketing Corona Virus Cybercrime Also Taking The World By Storm

By Stickley on Security | March 30, 2020 Skyrocketing Corona Virus Cybercrime In these uncertain times, staying smart about personal health is necessary to fight corona virus (COVID-19). But we also need to stay smart about cybersecurity. True to form, cybercriminals are doing everything they can to lie, cheat, and steal their way onto your […]

Categories
Achieving Dreams Meeting Needs Staying Secure

7 Ways to Protect Your Credit Score

7 Ways to Protect Your Credit Score When you swipe your credit card, you might not be thinking about what your creditors are doing to make sure they recover the money they just loaned you. But, as you make your next purchase, make sure to protect your credit score. Your credit score is a three-digit […]

Categories
Member Connections Staying Secure

Protect Yourself Against ID Theft!

Free workshop: Preventing Identity Theft Identity theft and related financial scams can cost you a lot of money—but most of all, recovering from fraud can also amount to months of lost time and energy. Join Detectives Zach Neemann and Thomas Lilienthal of the Deschutes County Sheriff’s Office for a free workshop, Preventing Identity Theft, scheduled […]

Categories
Meeting Needs

eStatements: Simplify, organize, and protect

With the click of a button, you can save resources, organize your financial records, and reduce paper waste—and you might even reduce your risk of identity theft. We’re all looking for ways to make life simpler and save a few steps on those things we manage every day. Our members tell us they want more […]

Categories
Member Connections Staying Secure

Equifax Breach Update

Equifax disclosed a data breach on September 7th that spanned from Mid-May through July 29, 2017. It is reported that approximately 143 million consumers were affected by this breach. Names, social security numbers, dates of birth, addresses, and in some instances, driver’s license numbers were obtained. All this sensitive information is what is needed by […]