YOU are a target.

•You, and your access to Shore’s data, are now the primary target of hackers.

•Gaining access to your login information allows them to impersonate you, or use your computer, to gain access to Shorer systems and data.

•Technology can address only a fraction of security risks.