Lock and key represents avoiding social engineering scams.

July 15, 2022

What are social engineering scams—and how can you avoid them? We take a look at the latest cyber threats. Presented by Gerard Longo, AIFA®: You receive an email from a website you regularly use asking you to click a link to change your Read More...
Computer keyboard with printout of hand and foot keys representing your digital footprint.

July 11, 2022

How do you reduce the digital footprint you leave behind every time you go online? Global Wealth Advisors' Director of Communications has compiled a Read More...
Signs of elder fraud image shows a get me out of here key on a computer keyboard.

May 26, 2022

Just browse through the latest true crime documentaries on your preferred streaming network and you’ll see that people of all ages and income Read More...
Choosing a Cloud Provider for Storage and Backup Depicts Hand Touching a Cloud.

June 28, 2021

Presented by Dean Elliott, CPFA®: You may have learned about cloud storage on the news, on the job, or from a tech-savvy friend. Because it Read More...
What Happens to Our Stolen Information After a Cyber Breach Image Shows Man in Hoodie Looking at a Computer.?

April 15, 2021

Presented by Ben Murphy, CPA, PFS™: After a cyber breach, we tend to think in terms of what the victim needs to do next. Can any of the stolen data Read More...
Password Manager Image of Man Typing User Name and Password on Laptop

February 26, 2021

Presented by Kris Maksimovich, AIF®, CRPC®: Whether you’re looking to make a New Year’s resolution or you’re simply trying to implement some Read More...