Empowering You to Stay Secure
- Team Payton
- Sep 9, 2025
- 4 min read
Updated: Sep 19, 2025

It's almost National Cybersecurity Awareness Month (October)

Here Are Answers to Frequently Asked Cybersecurity Questions
1. What to Do If You Think You Responded to a Phishing Message
If you suspect you’ve responded to a phishing message, act quickly to minimize potential damage. Phishing scams aim to steal sensitive information like passwords or financial details, but swift action can protect you.
Three Key Steps:
Change Affected Passwords Immediately: Update passwords for any accounts you may have shared details for, ensuring each is strong and unique. Avoid reusing passwords across accounts.
Contact Relevant Institutions: Notify your bank, credit card companies, or other affected services about the potential breach. They can monitor for suspicious activity or freeze accounts if needed.
Run a Security Scan: Use antivirus software to scan your device for malware that may have been downloaded. Disconnect from the internet to prevent further data exposure until the scan is complete.

Locking down your accounts
2. Confirming Antivirus Software and Recommendations
To check if you have antivirus software, look for an icon in your system tray (Windows) or menu bar (Mac) from providers like TrendMicro, Norton, McAfee, or Windows Defender. On Windows, open the "Security" settings to confirm Windows Defender is active. On a Mac, check for third-party antivirus apps in the Applications folder or System Settings under "Security & Privacy."
Many reputable products will allow you to use them with free trials available to test compatibility.
Three Tips for Antivirus Use:
Install and Update Regularly: Choose a trusted antivirus and keep it updated to protect against the latest threats.
Enable Real-Time Protection: Ensure your antivirus runs in the background to catch threats as they appear.
Scan After Suspicious Activity: Run a full system scan if you suspect a phishing attempt or malware exposure.
3. Reporting Scams or Suspicious Activity
Reporting scams is crucial to protect yourself and others. Forward phishing emails to the Anti-Phishing Working Group at reportphishing@apwg.org and report to the Federal Trade Commission (FTC) at ReportFraud.ftc.gov. For serious incidents, file a report with the FBI’s Internet Crime Complaint Center (IC3) at ic3.gov. If the scam impersonates a specific company (e.g., Wells Fargo), notify them directly using verified contact information from their official website.
Three Reporting Tips:
Act Quickly: Report scams immediately to help authorities track and stop cybercriminals.
Provide Details: Include the email, text, or URL involved to aid investigations.
Notify Impersonated Entities: Alert the company or person being spoofed to raise awareness.

There are resources to help you - Just a phone call away
4. Evaluating Credit Monitoring Offers After a Data Breach
Did you know there is a non profit that offers FREE assistance for victims of ID theft and fraud? Go to https://www.idtheftcenter.org/
Free credit monitoring offered after a data breach can be helpful, but approach with caution, especially if the provider is unfamiliar. Verify the company’s legitimacy by checking reviews, their website, and whether they’re endorsed by trusted sources like the breached organization. Reputable providers include Equifax, Experian, or TransUnion. If the offer is legitimate, it’s generally a good idea to enroll, as it helps detect unauthorized activity. You don’t need multiple services—one from a major bureau is sufficient, as they monitor similar data. Be wary of signing up with unknown providers, as some may be scams.
Three Tips for Credit Monitoring:
Verify the Provider: Ensure the monitoring service is from a trusted company before sharing personal information.
Monitor Regularly: Check reports for unauthorized accounts or inquiries, even with monitoring in place.
Consider a Fraud Alert: Contact a major credit bureau (Equifax: 800-525-6285, Experian: 888-397-3742, TransUnion: 800-680-7289) to place a free fraud alert for added protection.
5. Using Password Managers and Choosing the Safest Ones
Password managers are highly recommended to generate, store, and autofill strong, unique passwords, reducing the risk of credential theft. Choose based on your needs (e.g., 1Password for ease, Bitwarden for cost).
Three Password Manager Tips:
Select a Reputable Manager: Opt for a well-reviewed tool with strong encryption and a track record of reliability.
Enable MFA: Add multifactor authentication to your password manager for extra security.
Update Passwords: Use the manager to replace weak or reused passwords with complex, unique ones.
6. Securing Home Networks Against Vulnerabilities
Home networks, including WiFi and smart devices, are increasingly targeted by cyberattacks like “evil twin” WiFi scams or device exploits. You should be moderately concerned, as unsecured networks can expose personal data. Strengthen your defenses with these steps.
Three Tips to Secure Your Home Network:
Change Default Settings: Update your router’s default admin password and WiFi name/password to strong, unique credentials.
Use WPA3 Encryption: Enable WPA3 (or WPA2 if unavailable) on your WiFi for secure connections, and disable WPS to prevent easy access.
Update Firmware and Devices: Regularly update router firmware and smart device software to patch vulnerabilities, and use a separate guest network for IoT devices.
7. Services for Proactive Monitoring of Accounts, Credit, and Devices
Proactive monitoring is a smart way to stay ahead of threats. For credit monitoring, there are a lot of great products such as TransUnion's Identity Force (paid, comprehensive), or Credit Karma (free, basic monitoring) or Experian IdentityWorks (paid, comprehensive). For account and device monitoring, Avast One offers real-time threat detection, including phishing and malware alerts, and monitors the dark web for leaked credentials. Norton 360 with LifeLock combines antivirus, device security, and identity theft protection for all-in-one coverage. These services provide alerts for unusual activity, helping you act quickly.
Three Monitoring Tips:
Choose a Trusted Service: Select a reputable provider with strong privacy policies and transparent practices.
Set Up Alerts: Enable notifications for transactions, logins, or credit inquiries to catch issues early.
Review Regularly: Check monitoring reports and financial statements weekly for unauthorized activity.
Services to Remove / Scrub Information from the Internet:
If you are looking for a service to remove or scrub information from the internet - there are a variety of options to choose from. For the best combination of tools, automation, and a human touch, contact the team at Fortalice Solutions: 877.487.8160 || Email: Watchmen@Fortalicesolutions.com

Comments