see all articles

Update Your Cyber Hygiene

 

These days, it’s as important to lock our online homes as it is to lock our cars or physical homes. I was reminded of this recently when I checked my email and found a barrage of middle-of-the-night credit card purchases I hadn’t made. A thief had hacked in despite the fairly advanced security settings I have on that account.

Cybersecurity is a moving target because criminals are constantly improving their tactics for exploiting both technical and human vulnerabilities. So, when we think about security tips and techniques, it’s important to understand the security mechanisms on our devices, but also the habits and behaviors that either increase or decrease the dangers to our online presence.

Here are some key tasks and resources for improving your digital privacy and security.

Make multifactor authentication a regular thing

“There is no silver bullet solution with cybersecurity. A layered defense is the only viable defense.”     ~James Scott, Senior Fellow at the Institute for Critical Infrastructure Technology

Whenever possible, set up multifactor authentication on your email, social media, shopping, and financial services accounts for extra protection. This method adds another layer of security by confirming your identity via text message, email, code, fingerprint or facial recognition. Yes, this can be inconvenient, but inconvenience is part of the new standard for privacy in 2022.

Keep everything up to date

Bad actors rely on security gaps that we either don’t know about or fail to keep up to date. Your personal computer, mobile phone, tablet, and other devices periodically receive updates for their operating systems. Most of these include security-vulnerability fixes, and you should always apply those updates or, better yet, configure your device so they happen automatically. Likewise, enable automatic updates on your antivirus and malware software, and your applications, especially web browsers.

Default to being suspicious

Take a moment to reflect before clicking links in emails or downloading email attachments. Most cyberattacks start with a phishing email. These opportunistic messages may look legitimate, but they’re designed to fool you into

“Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed. In other words, hoaxes prey on the Human Operating System.”               ~Stewart Kirkpatrick, digital strategy consultant

revealing a password or other sensitive information or to infect your device with malicious software known as malware.

Being suspicious about phone calls is also wise, as scam calls requesting personal information are increasing. Be sure you recognize the caller and ask for their personal information and a call back number if you have doubts. Most scammers will respond by hanging up. If you’re still unsure, contact the bank, credit card company, or other institution the scammer claims to represent.

Use strong, unique passwords

Don’t use generic or simple passwords. Don’t reuse passwords on separate accounts. Change passwords on a regular basis. Consider using a password manager to generate and store unique passwords. If your credit card or other accounts offer password change alerts, as mine recently did, sign up for those alerts and heed them.

Be careful what you share

Criminals focus on gathering personal information shared on social media or elsewhere that can help them hack into your accounts. It’s wise to solidify your privacy settings in each of your social media accounts and to limit the details you might share about your home and family.

Request a credit bureau lockdown

All three major US credit bureaus provide credit freezes and fraud alerts at no cost to you if you call to request them. Freezes and alerts can protect you from identity theft or prevent further misuse of your information if it has been stolen.

Finally, Kaspersky offers a good cyber hygiene checklist (halfway down the page), and this checklist is also a great place to start for identifying your most important online security tasks.

If you have any questions about how you can better protect your identity, please reach out to your advisor. If you ever become aware that you’ve become a victim of identity theft, please contact TGS immediately so that we can place an alert on your Raymond James accounts.


By Joan M. Hill / Communications Coordinator

Please remember that past performance may not be indicative of future results. Different types of investments involve varying degrees of risk, and there can be no assurance that the future performance of any specific investment, investment strategy, or product (including the investments and/or investment strategies recommended or undertaken by TGS Financial Advisors), or any non-investment related content, made reference to directly or indirectly in this article will be profitable, equal any corresponding indicated historical performance level(s), be suitable for your portfolio or individual situation, or prove successful. Due to various factors, including changing market conditions and/or applicable laws, the content may no longer be reflective of current opinions or positions. Moreover, you should not assume that any discussion or information contained in this article serves as the receipt of, or as a substitute for, personalized investment advice from TGS Financial Advisors. To the extent that a reader has any questions regarding the applicability of any specific issue discussed above to his/her individual situation, he/she is encouraged to consult with the professional advisor of his/her choosing. TGS Financial Advisors is neither a law firm nor a certified public accounting firm and no portion of this article’s content should be construed as legal or accounting advice. A copy of the TGS Financial Advisors’ current written disclosure statement discussing our advisory services and fees is available upon request.

REQUEST A FREE CONSULT: 1-800-525-4075

Contact Us