Have you ever submitted a CreekHelp support ticket? You know that one of the required fields is to select a [Priority] for your ticket. Have you wondered what the priorities mean and how quick you may receive help? Hopefully we can help explain a bit of that today! The following Priority Levels exist: Today Critical […]
Read MoreAuthor Archives: Jason Jones
Top 5 Meta Scamps | 277
Facebook, now known as Meta, has over a billion users. That’s a lot of people who check their accounts regularly! Cybercriminals take advantage of Meta’s popularity to try to trick users every day. Here are the top five scams that cybercriminals use on Meta: Who Viewed Your Profile: This scam tricks you by telling you […]
Read MoreSubmitting a Support Ticket | 275
This article explores best practices for creating support tickets that communicate your concerns accurately and streamline the resolution process. Here are some best practices to follow: Submit Only One Issue Per Ticket This allows for clear and focused communication between the submitter and the support team. Focusing on one issue enables the support team to […]
Read MoreMission Trip Blog Subscriptions | 274
Did you know that each of our Mission Trips write a blog updating their friends and family on their journey through the Mission Trips? Sometimes these blogs are only written & sent the week of the trip. Other times the blog might be sent out occasionally leading up to the trip. Are you interested? Would […]
Read MoreEvil Twin Wifi | 273
Beware of “Evil Twin” Wi-Fi Connections Free Wi-Fi is widely available in many areas and businesses. Many people connect to these free networks while traveling or away from home. One particular scam called the “evil twin” attack involves a cybercriminal using a device to set up a fake Wi-Fi access point where you typically use […]
Read MoreCaptcha | 272
Verification Prompts Lead to Malware We are all used to following directions on websites to prove that we are “not a robot”. But a new tactic is tricking users into infecting their own computers by following fake “CAPTCHA” instructions to prove they are a human. These attacks play out in the following way: Text is […]
Read MoreCreate Strong Passwords | 271
Data breaches are more common now than ever before. A data breach is an intentional or unintentional leak of sensitive information. At least one of your current or old passwords has likely been exposed by a data breach. If your passwords are exposed, cybercriminals can buy them and gain unlimited access to your accounts and […]
Read MoreIntern Blog Subscriptions | 270
Did you know that each of our interns write a monthly blog updating their friends and family on their journey through the internship program? When an intern writes their blog, it is emailed out the following Monday at 9 am. Are you interested? Would you like to subscribe to an intern’s blog entry? Navigate to […]
Read MoreMinistry Calendar | 269
Did you know that Teamwork Projects offers a calendar option? While the calendar within Teamwork can be filled with lots of information and could be overwhelming, our goal today is to show a quick way to filter down to specific areas of the calendar. Note: Each item on the calendar is assigned to an [Event-Type]. […]
Read MoreChat Bots | 268
Watch Out for Chatbot Scams Chatbots are applications that can simulate real conversations. Many legitimate organizations use chatbots for customer service, such as helping customers troubleshoot problems with products. Some chatbots use artificial intelligence (AI) for more advanced tasks like writing essays, creating art, and more. Unfortunately, cybercriminals can also use chatbots for malicious purposes. […]
Read More