Postal Bulletin: Beware of Text Message Scams

Phishing is the fraudulent practice of sending emails or other messages claiming to be from trustworthy companies. These messages encourage individuals to disclose personal information, such as passwords and credit card numbers. Many people don’t realize that cybercriminals can also deliver phishing attacks through text messages, which is known as smishing. These types of scams…

 Continue reading

USPS: Watch out for coronavirus scams

If you’re a Postal Service employee, watch out for scams that attempt to use the coronavirus pandemic to con you into revealing personal information. Emergency situations are prime opportunities for criminals to take advantage of unsuspecting consumers. Scammers are creating websites devoted to the coronavirus pandemic and COVID-19, the disease caused by the virus. These…

 Continue reading

Postal Bulletin: Staying Safe in the New Cyber Frontier

Welcome to the New Cyber Frontier: What You Need to Know to Stay Safe The world changes fast, yet technology evolves even faster. While technology today provides great benefits such as being able to conduct business on the go, it also creates more risks. Cyber threats, which are criminal or unethical activities that take place…

 Continue reading

USPS: Charging smartly – Safety tips for personal devices

The Postal Service is reminding employees that plugging smartphones, unapproved thumb drives, e-cigarettes and other personal devices into USPS computers violates the organization’s security policies. Plugging unauthorized devices into postal equipment runs the risk of inadvertently transferring malicious software, which could disable computers and allow hackers to gain access to the organization’s network. To protect…

 Continue reading

USPS: Beware of Ransomware

Cybercriminals are turning to a new form of malware in large numbers. Ransomware, like the name suggests, is a new form of “cyber extortion” wherein the data on an infected computer or network is encrypted and inaccessible to the user unless a ransom is paid to the hacker. Any and all data, files, folders, or…

 Continue reading