Technology Tips and Alerts

Stay informed with guidance on cybersecurity, software updates, and tech best practices from our WVNET’s IT professionals.

Minimalist illustration showing a laptop computer with a text bubble, security padlock with eye symbol, and decorative stars. West Virginia Network logo in top right. Black and white design focusing on cybersecurity themes.
Technology Tips and Alerts

Security Hints + Tips- Tax Season

Every year, the bad guys take advantage of innocent taxpayers, like you, who are patiently waiting on their tax return. Last year, the IRS noticed a significant increase in phishing attempts to steal money or tax data, therefore you must be on high alert. How it Happens: Tax Scams and Malicious Activity The bad guys have a number of tax-related tricks up their sleeves when it comes to stealing your money and/or sensitive information. Here

Technology Tips and Alerts

MAC HOLIDAY GLOW-UP: DESKTOP EDITION!

Who says your Mac can’t get into the holiday spirit? We’ve got THE ULTIMATE guide to turn your boring desktop into a festive wonderland! LIGHT IT UP! Festivitas app, string lights everywhere, ugly Christmas sweater vibes, Christmas tree on your screen? Tag a Mac friend who needs this FESTIVE TECH GLOW-UP! #MacHoliday #TechDecor #FestiveMac

Reposted, Technology Tips and Alerts

Security Hints + Tips

How to Stay Safe While Working from Home You may work remotely on a regular basis or you may have been mandated to work remotely due to unexpected circumstances. Either way, working from home can feel much different from working in an office. You could find yourself snacking more often, getting distracted by furry friends, or forgetting the last time you put on real pants. No matter how your environment changes, it is important to

Reposted, Technology Tips and Alerts

Security Hints + Tips — Pretexting

Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as employees of bank or credit card companies to manipulate you into divulging personal or sensitive information. How it Works: Common Tactics of InfluenceThe bad guys will try to persuade you into giving them sensitive information. Oftentimes, the information that they need is not specific to your organization. Below are examples

Scroll to Top