Consumer Alerts

Cyber Security for Mobile October 18, 2019

woman,-mature,-middle-age,-business,-text,-mobile,-phone,-office-iStock-668361384-200dpi-x-7w

Almost all Americans, regardless of age, are using mobile devices. Often, mobile devices are used for sensitive activities, including banking, online shopping and social networking. Some of these activities require users to provide personal information such as their names, account numbers, addresses, email addresses and passwords. Moreover, apps routinely ask for access to information stored on the device, including location information.
 
In addition, the use of unsecured, public Wi-Fi hotspots has increased dramatically over the past few years. These networks are accessible on airplanes, in coffee shops, shopping malls and at sporting events. While continued access provides us with more flexibility and convenience to stay connected no matter where we are, it can also make us more susceptible to exposure.
 
The more we travel and access the Internet on the go, the more risks we face on our mobile devices. No one is exempt from the threat of cyber crime, at home or on the go, but you can follow these simple tips to stay safe online when connecting to the Internet from a mobile device:
 

    • Think Before You Connect. Before you connect to any public Wi-Fi hotspot–like on an airplane or in an airport, hotel, train/bus station or café-be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. Using your mobile network connection is generally more secure than using a public Wi-Fi network.
    • Guard Your Mobile Device. In order to prevent theft, unauthorized access and loss of sensitive information, never leave your mobile devices–including any USB or external storage devices–unattended in a public place. While on travel, if you plan on leaving any devices in your hotel room, be sure those items are appropriately secured.
    • Keep It Locked. The United States Computer Emergency Readiness Team (US-CERT) recommends locking your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or destroy your information. Use strong PINs and passwords to prevent others from accessing your device.
    • Update Your Mobile Software. Treat your mobile device like your home or work computer. Keep your operating system software and apps updated, which will improve your device’s ability to defend against malware.
    • Only Connect to the Internet if Needed. Disconnect your device from the Internet when you aren’t using it and make sure your device isn’t programmed to automatically connect to Wi-Fi. The likelihood that attackers will target you becomes much higher if your device is always connected.
    • Know Your Apps. Be sure to thoroughly review the details and specifications of an application before you download it. Be aware that the app may request that you share your personal information and permissions. Delete any apps that you are not using to increase your security.

 
SOURCE: Homeland Security – STOP. THINK. CONTENT.
 

Cyber Security for Businesses October 4, 2019

 

man with beard in business suit holding card that reads "Worth the risk?"

 

America thrives with small businesses in society. There are numerous opportunities for small businesses to fill needed niches within the industry. However, many small businesses may not have all the resources they need to have a strong cybersecurity posture. By implementing simple cybersecurity practices throughout the organizations, small business can safeguard their information and data for increased profits.

 

DID YOU KNOW?
    • 44 percent of small businesses reported being the victim of a cyber attack, with an average cost of approximately $9,000 per attack.1
    • Nearly 59 percent of U.S. small and medium-sized businesses do not have a contingency plan that outlines procedures for responding to and reporting data breach losses.2

 

SIMPLE TIPS
  1. Make sure all of your organization’s computers are equipped with antivirus software and antispyware. This software should be updated regularly.
  2. Secure your Internet connection by using a firewall, encrypt information, and hide your Wi- Fi network.
  3. Establish security practices and policies to protect sensitive information.
  4. Educate employees about cyber threats and how to protect your organization’s data. Hold employees accountable to the Internet security policies and procedures.
  5. Require employees to use strong passwords and to change them often.
  6. Invest in data loss protection software, use encryption technologies to protect data in transit, and use two-factor authentication where possible.
  7. Protect all pages on your public-facing websites, not just the checkout and sign-up pages.

 

RESOURCES AVAILABLE TO YOU

US-CERT.gov
The United States Computer Emergency Readiness Team (US-CERT) distributes bulletins and alerts for both technical and non-technical users, shares cybersecurity tips, and responds to incident, phishing, and vulnerabilities reports.

SBA.gov
The U.S. Small Business Administration (SBA) helps Americans start, build, and grow businesses. Through an extensive network of field offices and partnerships with public and private organizations, SBA delivers its services to people throughout the United States, Puerto Rico, the U.S. Virgin Islands, and Guam.

USChamber.com
The U.S. Chamber of Commerce has an Internet Safety Toolkit that teaches employees how to help protect company information, customer data, and their own personal information.

SOURCE: Homeland Security – STOP. THINK. CONNECT.

1 2013 Small Business Technology Survey, National Small Business Association
2 www.staysafeonline.org/about-us/news/new-survey-shows-us-small-business-owners-not-concerned-aboutcybersecurity, 2013

Cyber Security for Travelers September 23, 2019

Cybersecurity should not be limited to the home, office, or classroom. It is important to practice safe online behavior and secure our Internet-enabled mobile devices whenever we travel, as well. The more we travel and access the Internet on the go, the more cyber risks we face. No one is exempt from the threat of cyber crime, at home or on the go, but you can follow these simple tips to stay safe online when traveling.

 

travel,-airport,-father,-son,-plane,-window,-mobile,-phone-iStock-627281794

BEFORE YOU GO
    • Update your mobile software. Treat your mobile device like your home or work computer. Keep your operating system software and apps updated, which will improve your device’s ability to defend against malware.
    • Back up your information. Back up your contacts, photos, videos and other mobile device data with another device or cloud service.
    • Keep it locked. Get into the habit of locking your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or destroy your information. Use strong PINs and passwords.
WHILE YOU ARE THERE
    • Stop auto connecting. Disable remote connectivity and Bluetooth. Some devices will automatically seek and connect to available wireless networks. And Bluetooth enables your device to connect wirelessly with other devices, such as headphones or automobile infotainment systems. Disable these features so that you only connect to wireless and Bluetooth networks when you want to.
    • Think before you connect. Before you connect to any public wireless hotspot – like on an airplane or in an airport, hotel, train/bus station or café – be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. Do not conduct sensitive activities, such as online shopping, banking, or sensitive work, using a public wireless network. Only use sites that begin with “https://” when online shopping or banking. Using your mobile network connection is generally more secure than using a public wireless network.
    • Think before you click. Use caution when downloading or clicking on any unknown links. Delete emails that are suspicious or are from unknown sources. Review and understand the details of an application before installing.
    • Guard your mobile device. To prevent theft and unauthorized access or loss of sensitive information, never leave your mobile devices–including any USB or external storage devices–unattended in a public place. Keep your devices secured in taxis, at airports, on airplanes, and in your hotel room.

SOURCE: Homeland Security – STOP. THINK. CONTENT.

 

Equifax Breach Settlement July 29, 2019

In September of 2017, Equifax announced a data breach that potentially impacted the personal information of approximately 147 million people. Recently, a settlement was reached with Equifax which includes up to $425 million in monetary relief to consumers and some civil penalties.

If you are unsure whether you or a member of your family were impacted by the breach, you can check on the Equifax website dedicated to this incident. Should you find that you were impacted by the breach, you can follow the process outlined on their site to receive access to free credit monitoring, potential cash restitution, and identity restoration services.

www.equifaxbreachsettlement.com

 

Hey, That’s My Stuff! How to Avoid Mover Scams July 3, 2019

Family Unpacking Moving In Boxes From Removal Truck
 
4,100 consumers filed moving fraud complaints in 2017, according to the Federal Motor Carrier Safety Administration. How can you avoid negative experiences? Be aware of common scams, and take steps to protect yourself from these fraudulent activities.
 
Get it in writing: It might be tempting to get a quick quote and schedule your move over the phone. Don’t do it. This is one of the easiest ways to get scammed. Since you have nothing in writing, the movers can easily charge whatever they want once they begin, and they may hold your belongings hostage until you pay an outrageous amount. Always schedule an in-house walk-through to get an accurate quote, and get the agreed-to amount in writing.
 
Read the fine print: When you sign a contract with a mover, read all the fine print. Make sure you understand the terms of payment before you sign. Unscrupulous movers may include terms that allow them to hijack your belongings after demanding more money. If you’ve signed anything that allows for these practices, the police will be unable to intervene.
 
Vet the movers: Before you agree to work with a moving company, research its reputation. Contact the Better Business Bureau to check the company’s rating. Ask for recommendations from friends. Read online reviews. Ask movers for proof of registration, proof of insurance and an office address. Take the time to vet the mover, so you know you are working with someone you can trust.
 
Try a hybrid approach: Consider renting and driving the truck yourself, and hiring movers for loading and unloading only. This will keep your possessions under your control to prevent hijacking scams. (It can also reduce the cost of the move!)

Blog Archive

Follow Us on FacebookIcon For: Facebook Widget