Is your personal data protected?

Six tips for stronger cybersecurity

From phishing attacks, malware and account hijacking to removable media, denials of service and intellectual property theft, cybersecurity incidents are constantly evolving and the impacts are becoming more severe. Here are six tips to help prevent identity theft and computer hacking attempts:

  • Evaluate the source of email. It’s important to cautiously review personal and work email across all devices and consider the source before opening messages.
    • The first step for many hackers is sending a phishing email in an attempt to capture login credentials or download a file to your computer. A malicious downloaded file can collect and pass private information from your computer to a hacker or lock down your computer in a ransomware attack. The best prevention often starts with a healthy dose of skepticism. Be extra cautious of attachments or embedded links asking you to provide information. If in doubt, verify with sender by using an alternate medium, such as a text message or phone call.    
  • Change your passwords regularly. A best practice is to change your passwords at least every 60 to 90 days. Other password tips:
    • Don’t use the same password for multiple accounts — if your password is accessed by hackers on one account, it makes it much easier for them to attack additional accounts.
    • Be sure to use a combination of symbols, letters and numbers to strengthen your passwords.
    • It’s okay to use a reputable password manager app that uses strong encryption to store your passwords but always use one that has dual-factor authentication functionality.
    • Don’t share your passwords with anyone, including your administrative assistant.    
  • Clear your browsing history and all cookies regularly.  It’s a best practice to perform this action weekly to clear stored passwords and other data from websites and forms in your history.
  • Use dual-factor authentication. Where available, use dual-factor authentication to help ensure that people trying to gain access to your online account are who they say they are. This is very important for sensitive accounts such as investment accounts.
  • Set up alerts for all your financial accounts. The alerts will notify you of changes to personal settings like password changes, address changes, or account transactions over a preset amount.
  • Use off-computer storage for critical documents. Where are your sensitive digital documents stored? For example, do you keep copies of your tax return or quarterly investment statements on your laptop or in a folder in your email? It’s best to save them on a secure encrypted drive or folder.

What should you do if you suspect your computer has been hacked or you’re notified of a breach of an account or your personal information? If you suspect a cyber breach, follow these steps:

  1. Change your passwords immediately. This is especially important for financial accounts.
  2. Alert your financial adviser and bankers. They can watch for any suspicious activity on accounts.
  3. Consider closing and reopening new bank and financial accounts.
  4. Set up alternate password types and PIN numbers where possible. Some custodians will allow you to set up a verbal password for any transactions. You can also set up a personal identification number as a requirement to file tax returns in your name. This provides added security from tax return fraud.
  5. Check your credit report often for suspicious activity. By law, you’re entitled to a free credit report from all three major credit reporting agencies (TransUnion, Equifax and Experian) each year. You can also use monitoring services that provide unlimited access to your credit information year-round.
  6. Consider “freezing your credit” with the credit reporting agencies. If you don’t plan on setting up a new line of credit soon, freezing your credit can prevent cybercriminals from applying for credit in your name.

Cybercrime is on the rise, and so is the need for extreme vigilance over your personal digital security. The measures outlined here — once considered by many to be an overreaction to a negligible threat — are based on the hard experiences of real-life users and are now considered a minimum standard for cyber protection. Remember, cybersecurity starts with you.

Headshot of Joe Reich

Joe Reich

CPA, CCIFP, Senior Manager, Plante Moran

About the Goering Center for Family & Private Business

Established in 1989, the Goering Center serves more than 400 member companies, making it North America’s largest university-based educational non-profit center for family and private businesses. The Center’s mission is to nurture and educate family and private businesses to drive a vibrant economy. Affiliation with the Carl H. Lindner College of Business at the University of Cincinnati provides access to a vast resource of business programing and expertise. Goering Center members receive real-world insights that enlighten, strengthen and prolong family and private business success. For more information on the Center, participation and membership visit goering.uc.edu.

Related Stories

3

Protect Company Assets by Mitigating Cyber Risks

April 8, 2021

Cyber threats and insurance have become a ubiquitous business issue. Insurance is intended as a vehicle to transfer catastrophic risk to carriers contractually in consideration for premium dollars. There is no coverage area where the risks evolve more rapidly than cyber, and so the insurance must evolve with it.