You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.
Beware phishing e-mails, fake texts, and multi-factor authentication requests (calls, texts, or app) when you are not actively trying to log in to a BTC system.  
We have received numerous alerts regarding this type of cybersecurity criminal activity.
See articles below for samples and learn about red flags in these messages.

 
Home > General > Where can I access cybersecurity information?
Where can I access cybersecurity information?
print icon

Check out these trusted resources for cybersecurity information:

 

 

 

 

Cybersecurity & Infrastructure Security Agency: https://www.cisa.gov/

 

 

What should I do if I believe I've been a victim of a cybercrime?

If you discover that you have become a victim of cybercrime, immediately notify authorities to file a complaint. Keep and record all evidence of the incident and its suspected source. The list below outlines the government organizations that you can file a complaint with if you are a victim of cybercrime.

FTC.gov: The FTC’s free, one-stop resource, www.identitytheft.gov/can help you report and recover from identity theft. Report fraud to the FTC at ftc.gov/OnGuardOnline or www.ftccomplaintassistant.gov.

US-CERT.gov: Report computer or network vulnerabilities to US-CERT via the hotline: 1-888-282-0870 or us-cert.cisa.gov. Forward phishing emails or websites to US-CERT at phishing-report@us-cert.gov.

IC3.gov: If you are a victim of online crime, file a complaint with the Internet Crime Complaint Center (IC3) at www.IC3.gov.

SSA.gov: If you believe someone is using your SSN, contact the Social Security Administration’s fraud hotline at 1-800-269-0271.

 

 

The attached PDFs provide information about how to avoid phishing, ransomware, identity theft, and more!

 

 

Feedback
0 out of 0 found this helpful

Attachments

Avoid_Becoming_a_SocMedia_Victim.pdf Click_with_Care.pdf How_To_Spot_a_Deepfake.pdf Major_Keys_to_Ransomware_Protection.pdf Security_Hints_and_Tips_Google_Yourself.pdf Security_Hints_and_Tips_Stay_Safe_On_Social_Media.pdf Security_Hints_and_Tips_Unexpected_Emails.pdf Security_Hints_and_Tips_Unsafe_Email_Attachments.pdf
scroll to top icon