Important Documents To Keep Safe and How To Do It
12/18/23Blue Chip Partners Quarterly Edge: Q1 2024
01/08/24Authored by Erin Goss, Chief Operating Officer, and Antone Lamerato, Operations Manager
To fortify your level of cybersecurity, consider these protective measures:
Use a “Strong” Passphrase: A passphrase is a password composed of a sentence or a combination of multiple words. Typically, passphrases tend to be longer than a regular password, which inherently makes them more difficult to guess. It’s important to use unique passphrases for different accounts. Websites like UseAPassphrase.com can help generate a completely random passphrase. An example of a passphrase is: “Bik3M@ckinacIsl@nd.” Substituting letters with symbols is an easy way to increase the complexity of a passphrase while keeping it easy to remember.
Implement Advanced Authentication: Two Factor (2FA) or Multi Factor Authentication (MFA) is a great way to augment the security of any online account. Advanced authentication makes accounts more secure by requiring at least two forms of authentication to access the account. After entering a password, you’re required to supply a second piece of information before accessing an account. This can take the form of a code delivered through e-mail, text message, or a third-party app on your phone. Even if your password is compromised, a malicious third party would not be able to access your account without having that second piece of information. Further strengthening options include voice ID; as well as facial or fingerprint recognition, which are more difficult to replicate.
Leverage Account/Security Alerts & Regular Monitoring: Having alerts set up in your online account settings can provide real time updates for any activity and allows for monitoring for any unauthorized transactions. In addition, regularly reviewing financial statements and transactions for any suspicious activity is best practice to facilitate timely reporting of any discrepancies promptly to the relevant institutions.
Avoid Public Wi-Fi Networks or Computers: Public networks (like those you find in a coffee shop, doctors office, or restaurant) can be inherently insecure. Oftentimes, the password for these networks is publicly posted, or they may not be password protected at all. Cybercriminals use a variety of techniques and tools to sneak into unsecured networks and steal sensitive information including passwords, financial data, and other personal details to use for identity theft. A Virtual Private Network, or VPN, reduces your visibility on public networks making it harder for cybercriminals to access your sensitive information. It’s also important to avoid using public computers that require entering personal information for access. If you must use a public computer, always log out completely by clicking on the “log out” button on websites to terminate the online session.
Keep Device Software Up to Date: With new security vulnerabilities continually coming to light, it’s imperative to ensure all hardware and software are up to date so that the latest fixes are deployed. Devices typically notify you to run updates for everything from apps to the operating system running the device. Apps like web browsers and anti-virus software are particularly important to keep updated, as they provide the most exposure and the most protection, respectively, to outside threats. Most devices support automatic updates which keep devices current.
Manage Social Media Privacy: Social media represents a unique risk. It is so easy to share information, and some people feel obligated to post real-time updates of their whereabouts, emotional state, etc. It doesn’t require a sleuth to have any special knowledge to gain access to personal information that could be used against you. At a minimum, adjust privacy settings on your social media platforms to restrict the exposure of personal and financial information. Even with accounts set to private, people gain access to your sensitive data from your:
- Profile Information – name, birthdate, and contact details
- Status Updates – personal life events, work & relationship status
- Location Data – Hometown, vacation spots; avoid posting pictures of yourself on vacation when you are there! You have just told the world you aren’t home
- Shared Content – personal images & videos
Stay tuned for part 3 of our series on cybersecurity, where we’ll talk about steps to take if you find yourself in the unfortunate situation of dealing with identity theft.
Click here to read part 3 of our cybersecurity series, ‘My Identity Was Stolen – Now What?’.
Expressions of opinion are as of this date and are subject to change without notice. Any information provided is not a complete summary or statement of all available data necessary for making an investment decision and does not constitute a recommendation to buy, hold, or sell any security. There are limitations associated with the use of any method of securities analysis. The information has been obtained from sources considered to be reliable, but we do not guarantee that the foregoing material is accurate or complete. Every investor's situation is unique, and you should consider your investment goals, risk tolerance, and time horizon before making any investment. Prior to making an investment decision, please consult with your financial advisor about your individual situation. Past performance does not guarantee future results. Investing involves risk, and you may incur a profit or loss regardless of strategy selected. There is no guarantee that any statements, opinions, or forecasts provided herein will prove to be correct. Dividends are not guaranteed and must be approved by the company Board of Directors. Indices are included for informational purposes only; investors cannot invest directly in any index. Please note, changes in tax laws or regulations may occur at any time and could substantially impact your situation. While we are familiar with the tax provisions of the issues presented herein, as Financial Advisors of Blue Chip Partners, Inc. we are not qualified to render advice on tax or legal matters. You should discuss any tax or legal matters with the appropriate professional.