How To Protect Yourself From Cyberattacks

Preston Rosamond |

By Preston Rosamond

Life is busy and stressful enough on its own. The last thing you need to deal with is a hacked account or worry about identity theft. Unfortunately, as we become increasingly dependent on technology and use multiple devices on any given day, there are more opportunities for our personal information to be compromised. But no matter how daunting this may seem, just remember that knowledge is power. One of the best things we can do is learn about what cyberattacks are and how to prevent them from happening. 

Cyberattacks, Defined

First, let’s look at what cyberattacks are and why they pose a threat to you and your money. Cyberattacks are malicious attempts to access or damage a device’s data, including computers, phones, gaming devices, printers, and other devices. If the hacker succeeds, they could access your personal information and the capability to block access or delete your documents and pictures. (1) With this information, they could potentially steal your identity, money or credit, damage your reputation, or jeopardize your safety. 

Not something you want to experience, right? Here are 4 simple steps you can take to ensure your safety. 

1. Improve Your Password Strength

Your first line of defense online is passwords. Your passwords are the gates between criminals and things like your financial accounts, so you want them to be as strong as possible. And when it comes to passwords, strength comes from complexity. Aim to use a mix of upper- and lowercase letters, special characters, and numbers. To make them easier to remember, choose a phrase or acronym that you created yourself. 

In addition to strong passwords, you want to make sure you have separate passwords. Don’t use the same one, or a simple variation of the same one, for multiple accounts or websites. Also, avoid using your name, government ID numbers, address, or other personal information that can be easily found, such as the names of your children or pets. 

Consider using a password management app or software. (2) They take the pressure off you to remember every single password and remove the temptation to have them written down somewhere. It’s also good practice to change your passwords 3 to 4 times a year. When offered, add a second barrier to entry in addition to your password with two-factor authentication.

2. Watch Your Inbox Like A Hawk

Phishing scams show up in your inbox regularly, even if you’ve applied stringent security settings to your email account. If an email sneaks in that looks like it is from a financial institution, do not click on any of the links or open any attachments. Most financial institutions will send you a secure message through your account rather than a direct email. Delete the email or report it to your provider. 

Before you click on a link in any email, check two things: the sender’s email address and the link destination. Phishers often try to look legitimate by showing up in your inbox with a realistic name, but if you hover your mouse over the sender’s name, you will see the full email address to determine if it is from a trusted source or not. Use the same tactic with the clickable links inside the email message. Hover your mouse over the hyperlink and see where the link will take you. If it looks suspicious, delete the email. To be safe, when shopping online, type the retailer’s URL into your browser instead of clicking email links.

3. Be Picky About Your Wi-Fi

We’re so used to using our phones everywhere we go that we often don’t think about the security of the Wi-Fi networks we connect to. But it might be worth it to give it some extra thought, especially when you are shopping online while using public Wi-Fi. Avoid submitting your credit card information unless you are connected to a private, secure wireless network. In other words, save your shopping for home or another trusted network, not for your local coffee shop. 

If you do need to enter personal information on the go, turn your Wi-Fi off and use your phone data, connecting you to your more-secure cellular network, or consider investing in a virtual private network (VPN) so you can use public Wi-Fi with more peace of mind. 

4. Subscribe To Alerts

Many financial institutions offer customizable notifications. You can choose to receive alerts for transactions placed outside of your geographical area, purchases above certain amounts, or instances when your credit card is used without the card being present. If you receive a notification for a charge you did not make, alert your credit card company or bank immediately and freeze the account.

Notifications aside, be sure to regularly review your credit card transactions. Make it a habit to check for unknown line items or irregularities. Inspect your credit report and look for errors in your personal information or lines of credit. If you see anything amiss in these reports, your identity may have been stolen. You can get three free credit reports a year from annualcreditreport.com and a free TransUnion and Equifax report once a week from creditkarma.com.

Protect Yourself

While it can feel unnerving to think about cyberattacks and hacking, implementing some of these tips may help you feel more confident and can help you reduce your risk. If you have questions about your online information or how The Rosamond Financial Group will work to protect your information, book a free introductory meeting online!

About Preston

Preston Rosamond is a financial advisor and the founder of The Rosamond Financial Group Wealth Management, LLC with nearly two decades of industry experience. He provides comprehensive wealth management and financial services to individuals, professionals, and families who enjoy simplicity and seek a professional to help them pursue their goals. Preston personally serves his clients with an individual touch and a sincere heart, and his servant’s attitude is evident from the moment you meet him. Learn more about Preston or start the conversation about your finances with him by emailing smrosamond@rosamondfinancialgroup.com or schedule a call with our online calendar.

__________

(1) https://www.ready.gov/cybersecurity

(2) https://www.pcmag.com/picks/the-best-password-managers