It’s hard to imagine life today without our cell phones, tablets, laptops and other devices. We engage with them everyday. And unfortunately, cyber criminals do too.

The good news is that we can understand how cyber crime works and there are many things we can do to stay safe and protect ourselves.

Cyber threats are real

Cyber threats have evolved worldwide both in volume and sophistication. As we become more dependent on digital tools and online spaces, the way we manage our information also needs to evolve.

  • 0 %

Data breaches rose last yearthe highest total ever1

  • 0 billion

spoofed e-mails are sent every day2

  • 0 %

of social engineering attacks are phishing3

  • 0 %

of cyber attacks are aimed at small businesses4

What you don’t know can hurt you

With a bit of diligence and care, you can safeguard your accounts and information.

And the key is awareness. Here are some of the most common attack techniques:

  1. Social engineering: cyber criminals lure you into revealing your personal or confidential information via email, online channels, phone or even in person, increasingly using:
    • Deepfakes that clone authority figures through images, videos and audio
  2. Viruses: cyber criminals try to access your information through malicious programs that attach themselves to authentic programs. They run without your knowledge or permission on your computer or mobile/tablet device.
  3. Supply chain attacks: cyber criminals may try to break into a supply chain and intercept data at one of the steps involved in getting a finished product or service to you, the customer.
  4. Vulnerability exploits: occur when cyber criminals develop specific code that is designed to either:
    • Take advantage of a certain weakness to obtain unauthorized access to systems or networks. For example, a network has a poorly protected wireless connection.
    • Compromise a resource. For example, outdated software can lead to operating system vulnerabilities.
  5. Ransomware: a malicious program that blocks access to your computer, device or data, and demands that you pay a ransom to regain access.

Five essential steps to take

1.Multifactor authentication and unique passwords

Multifactor authentication combines two or more independent credentials for greater safety. For example, a password plus a mobile device or security token. It can include biometric verification or you can use biometric (e.g., face recognition) alone.

Use passwords unique to every platform (social media, bank, e-mail, etc.). In addition:

  • Don’t allow auto-save of passwords
  • The strongest passwords are “pass phrases”—a long phrase that’s easy to remember but hard to guess. For example: “car train knob boot snack” would be meaningful to you but hard for a hacker to guess. Change passwords regularly—at least every 3 to 6 months

A trusted secure password manager allows you to access dozens of websites and apps with a single password despite having different usernames and passwords for each account.

2.Secure your networks

When setting up your home or business Internet, first change the default administrator password of the device controlling your wireless network. Creating a strong password prevents others from connecting.

Second, enable encryption on your Wi-Fi router, preferably WPA2, which ensures online activity in your network is encrypted.

Finally, only allow people you trust to connect to your wireless network.

3.Harden your devices

To harden your devices and reduce vulnerabilities:

  • Only install applications from trusted sources such as app stores or known websites.
  • Delete applications you no longer need or don’t know the origin of
  • Keep all applications and operating systems up to date
  • Install anti-malware software and keep it up to date
  • Don’t plug suspicious USB devices such as flash drives into your computer
  • Use your cell phone rather than public Wi-Fi when on the go

4. Back up important files

Back up files regularly—automatically to a secure cloud and manually to an encrypted external hard drive. These files can include:

  • Family photos
  • Financial records
  • Other important documents

5.Be alert to social engineering

Social engineering is when criminals convince you to provide personal or financial information under false pretenses, either by posing as someone else or preying on your emotions.

You want to be especially careful about clicking on unusual links online. And if you receive a phone call from someone and feel suspicious about it, pause and tell them you’ll call them back. You can then use a phone number you know and have on file to validate them and any request they may have made.

Take care with social media

With more ways for cyber criminals to fake different personas, it’s important to take care about what personal information is out there.

  • In your social media profiles and posts, avoid publishing personal information
  • Use privacy settings
  • Accept friend requests only from people you know
  • Be wary of sharing your current location or future travel plans
  • Be careful about taking online polls or quizzes or downloading apps that can access your information

What to do if you’ve been hacked

If you experience a data breach or identity theft, it can feel overwhelming and frightening. Stay calm and take these important steps:

Detect

  • Take warning signs seriously and act fast
  • Verify if the threat is real
    • Check your user account activity if possible
    • Check with the NationalCybersecurity Center

Respond

  • Immediately change the log-on details for the impacted services
  • Consider:
    • Alerting financial institutions
    • Reporting to authorities such as the NationalCybersecurity Center
    • Law enforcement

Recover

  • Regain control of your hacked online accounts
  • Consider a factory reset of your affected devices
  • Restore your data from a trusted backup

Dive deeper

Our publication provides even more information to help you and your loved ones stay cyber safe.

cybersecurity document image

Connect with us

Our Private Wealth Management offices are located in various cities throughout the US. If you would like to explore how Private Wealth Management may serve you and your family’s needs, please contact one of our offices.

East coast

Christopher DiMuria

Manhattan Market

Jim Ducey

Greater Boston Market

Julie Fox

Philadelphia/D.C. Market

Lane Strumlauf

Southeast Market

West coast

Lauren Gorsche

Los Angeles Market

Todd Locicero

San Francisco Market

Midwest

Michael Gatewood

Chicago Market

Mitch Markley

Colorado Market

Tommy Stacy

Texas Market