Loading...

Cybersecurity resources from Nationwide

Leverage our cybersecurity and fraud guidance to help protect your digital information
Cyberattacks are on the rise, but Nationwide can help you be prepared. Look to us for the latest insights, best practices and education around cybersecurity to help you mitigate potential damage and provide peace of mind.

Featured

Credential stuffing attacks

Credential stuffing attacks

Learn about credential stuffing attacks, how cybercriminals exploit reused passwords, and effective strategies to protect against this growing cyber threat.

Avoid online malvertising

Avoid online malvertising

Learn how to identify malvertisements and prevent malware infections.

Generative AI attacks

Generative AI attacks

Social engineering is a cunning cyberattack technique used to coerce individuals into disclosing their personal information.

Cyber best practices

Safe and Responsible use of chat services at work

Safe and Responsible use of chat services at work

Discover ways to maintain secure and compliant communications when instant messaging in the workplace.

LinkedIn safety tips

LinkedIn safety tips

Securing your LinkedIn profile helps protect everything from your professional reputation to your identity and workplace. Read about our LinkedIn safety tips.

Creating strong passwords

Creating strong passwords

Long passwords don’t have to be hard to remember, but they do need to be difficult for someone else to guess.

Mobile security strategies

Mobile security strategies

The portability of mobile devices makes them easy targets for theft.

Recognize phishing red flags

Recognize phishing red flags

Phishing is the primary attack method in the cyber criminal’s playbook.

Safe email behaviors

Safe email behaviors

It’s important you understand what is safe and not safe when processing email in your inbox.

Secure home Wi-Fi

Secure home Wi-Fi

Is your home wireless network (Wi-Fi) safe from snooping criminals?

Smishing and vishing

Smishing and vishing

Smishing is a form of social engineering that exploits SMS, or text messages.

Social media safety

Social media safety

Cyber thieves use this information to break into your online accounts or even your house.

WFH privacy and security

Remote Work privacy and security

Understand what non-public information is and how to properly manage, share, and store it.

Use public Wi-Fi wisely

Use public Wi-Fi wisely

Not all public WiFi is secure. Understand how to protect yourself on the web.

Cybersecurity 101

SEO attacks – beware of search results

SEO attacks – beware of search results

Learn what an SEO attack is and how to protect yourself from a cyberattack.

How Cybercriminals Have Evolved

How cybercriminals have evolved

Cybercriminals come in various forms and have evolved significantly over time, learn how to protect yourself today.

Account takeover

Account takeover

Their goal is to steal personal information or obtain financial gain by leading you to believe you are interacting with someone you trust.

Why you might need cyber coverage

What is cyber coverage?

With cybersecurity breaches making frequent headlines, consumers may wonder how to protect themselves.

What is ransomware?

What is ransomware?

Ransomware attacks are becoming more frequent, and their impact is getting more expensive each year.

Top cyber security tips for consumers

Top cybersecurity tips for consumers

Do you have an online footprint? With the amount of personal and financial information stored in cyberspace, there are traces of just about everyone on the internet.

Different types of cyber-attacks to know about

Different types of cyber-attacks to know about

As cyber criminals become increasingly sophisticated, it’s critical for consumers to be informed about the different kinds of cyber threats they may be faced with and how to avoid them.

Do privacy regulations impact you?

Do privacy regulations impact you?

Around the world, governments and other organizations are implementing privacy regulations to help safeguard consumers from bad actors looking to cash in on their private information.

Cybersecurity & fraud guidance