• Three ways to protect your information from cybercriminals

    by Badgley Phelps | Aug 26, 2024

    Our digital world offers us the convenience of doing just about anything online, from banking to communicating to working, shopping, and beyond. However, the personal and financial information we store and share online is more vulnerable to cyberattacks than ever. University of Maryland's Clark School of Engineering recently sought to quantify how often unprotected computers are attacked and found that, on average, the computers in the study received 2,244 cyberattacks daily—nearly one every 39 seconds. Without the proper measures, individuals and businesses can easily become victims. Here are seven simple steps to protect yourself and your wealth.

    1. Use strong, unique passwords and enable two-factor or multi-factor authentication

    Operations and IT Manager Kenny Mayer says, "In our increasingly digital world, staying vigilant and proactive about cybersecurity is crucial. Using strong, unique passwords and enabling multi-factor authentication can significantly enhance your online safety. Remember, most cyberattacks exploit weak or reused passwords, so taking the time to secure each account is well worth the effort."

    According to Norton, while 91% of people understand that reusing passwords is a security risk, many still need to learn to use unique passwords every time. Since more than 80% of confirmed breaches are related to stolen, weak, or reused passwords (LastPass), it's worth taking the time to review your password manager and make sure each account is secure.

    A strong, unique password should be at least 12 characters long and include a combination of uppercase and lowercase letters, numbers, and special characters. To enhance their security and reduce the risk of unauthorized access, users should not use passwords across multiple accounts.

    A tip from the team at Clark School? Don't use a password identical to or even related to the associated username. "Some 43 percent of all password-guessing attempts simply reentered the username. The username followed by '123' was the second most-tried choice."

    Multi-factor authentication (MFA) or two-factor authentication (2FA) helps account security become even stronger. With these enabled on an account, a second form of verification, such as a fingerprint scan or code texted to your phone, is required to access it. The added MFA security barrier can stop attackers, even if they have already obtained your password. It's a good idea to check if MFA or 2FA is an option—where it is, enable it.

    2. Keep your software updated

    Hybrid work has changed many things, including keeping our professional devices current. IT departments now must rely on individuals to help keep data safe. Keep your software updated since updates often include patches that fix vulnerabilities that hackers could exploit. Check for updates for your operating system and applications and promptly install them to ensure you have the latest protection against known security threats.

    While most new computers come with antivirus and anti-malware software built in, it's also essential to keep that up to date. Third-party antivirus software may be an excellent additional layer of defense against cyberattacks if you need extra security, such as software that monitors webcam use or looks for patterns of malicious behavior even when it hasn't detected a virus.

    3. Audit your personal online behavior and make changes, if necessary

    As Fortune reports, the DataReportal Global Overview Report revealed, "Internet" users ages 16 to 64 spend an average of six hours, 40 minutes daily surfing the web on any device. That's about 47 hours a week and 101 days a year. By this estimation, beginning at age 18, a person who lives to be 80 will have spent more than 17 years of their adult life using the internet."

    With that level of internet use, we're bound to slip up and make unsafe choices occasionally that could lead to cyberattacks. It's good to assess your online behavior and make sure you're regularly:

    Limiting what personal information you share: The more cybercriminals know about you, the easier it is for them to target you. Limit what you share and use your accounts' privacy settings to limit who can see it. Periodically search for your name online to see what information is publicly available on you and remove anything unnecessary.

    Exercising caution with emails, links, and downloads: Cybercriminals often use malicious links and downloads to spread malware and steal personal information. And sometimes, the emails that look fine are actually phishing tactics. For example, "whale phishing" specifically targets high-level executives who are able to approve large payments with emails that impersonate a peer within the target's company or organization. Don't click on links or download attachments from an unverified source, especially from unsolicited emails and messages. Be wary of any unexpected requests for large sums, even if the request seems to come from someone you know.

    Monitor your accounts: When a cybercriminal gains access to someone's accounts, it can go unnoticed for a long time, particularly if it's an account you don't use frequently. Monitor your accounts for any suspicious activity so that you can quickly identify and respond. Take advantage of alert services from your financial institutions that notify you of unusual transactions, logins, and other suspicious behavior, such as password changes.

    The digital landscape is continually evolving, and cybercriminals' tactics are, too. Says Mayer, "Keeping your software updated and auditing your online behavior is essential to protect yourself from cybercriminals. Regularly updating your operating system and applications ensures you have the latest security patches. Being mindful of the information you share online and exhibiting caution with emails and downloads can prevent potential breaches. Stay informed and proactive to minimize your risk."

    Read more about staying safe online and protected from identity theft here.

 

Subscribe to Our Blog

  1. Email address is required.
    You have entered an invalid email address.
  2. First name is required.
  3. Last name is required.
Subscribe

Search Our Blog

Recent

Categories