CAREERS  |  BLOG
Pearl Technology Hosts Operation Boomerang Cybersecurity

Pearl Technology Hosts Operation Boomerang

Those who attended today’s Operation Boomerang at Peoria’s Riverfront Museum learned some practical tips to stay safe from scammers. The event, which was geared toward protecting seniors from cybercrime, had a great turnout, and attendees walked away with information they can use.

Download a PDF of today’s presentation here.

Tips for Staying Safe
• If you don’t recognize a phone number, don’t answer.
• If it is important they will leave a message.
• If you get a text, don’t click on any links.
• Be very wary of any pop-ups on your computer.
• Pop-ups are almost aways scams.
• Turn on the pop-up blocker on your browser.
• If you don’t know how, Google and YouTube are your friends.
• Never trust incoming calls or messages.
• Instead, go to the source to verify.

If you buy something from a person online:
• Don’t give them money until you have seen the item.
• Meet them in a safe place like a police department parking lot.
• If you get a text about a shipment, don’t respond to the text.
• Go to the shipper’s website.
• If a deal looks too good to be true, it is too good to be true.

• Keep your phone contacts up to date to make it
easier to identify an incoming call or text.
• If you don’t know someone, don’t trust them.
• Do not carry on an online conversation with people
you don’t know.
• NEVER send compromising photos, even to people
you know. Once it has crossed the internet, it will
always be on there.
• Be aware of AI and its capabilities.

Does your business need help with IT solutions, cybersecurity, data centers, or audiovisual integration? Contact us to see what technology solutions might work best for you.

Related Blog Posts

One Disaster Recovery Tip
Cybersecurity

One Disaster Recovery Tip That Could Save Your Business

Imagine crafting a piece of ransomware, a masterpiece designed to stealthily penetrate defenses, encrypting everything in its path, rendering data inaccessible to its rightful owners. The attack begins with phishing emails, exploiting software vulnerabilities, or brute-forcing weak passwords. Once inside,

Read More »
Tips to Help Protect Your Data
Cybersecurity

Tips to Help Protect Your Data

Given the recent AT&T data breach, Anthony Mini recommends the following:
1. Monitor your accounts with identity protection services.
2. Check the status of your e-mail accounts that have been exposed to other breaches using the website: https://haveibeenpwned.com/.<br

Read More »
Local Area Network 2.0 Cybersecurity
Cybersecurity

Local Area Network 2.0

From its inception, the internet has undergone numerous changes and advancements, transforming the way we communicate, learn, and do business. However, one aspect that has remained relatively unchanged is the Local Area Network (LAN), the private IP space that runs

Read More »