Cybersecurity Protection Tips

By Bryan Burchette

Director of Information Systems & Security

January 1, 2024

Cybersecurity attacks continue to be on the rise.

But we do have some control in protecting ourselves. Understanding human behavior, educating ourselves in areas of cybersecurity, and taking diligent measures will always remain the first line of defense.

Your Home Network

 

  • The internet enters your home via a device called a router or modem and is usually supplied by your internet provider. The device has a default password for the administrator account. Be sure to change the password from the default setting to a strong password.
  • If you use WIFI in your home, enable encryption on your WIFI network. WPA2 is the preferred type of encryption. If your device does not support WPA2 encryption, consider purchasing a new router with support for modern encryption. You may need to work with your internet service provider to ensure device compatibility.
  • Keep computers you use at home (both personal and work) current with the latest security and operating system updates. Older operating systems do not get security updates and are targets with known vulnerabilities so be sure you are running the most recent version of the operating system for the type of computer you’re using. The major operating systems have built-in anti-virus and anti-malware as well as the ability to automatically update themselves. All these features should be verified to be on and working.

 

Your Email

 

Email is a gateway tool used by criminals to gain access to you and your information and to commit cybercrimes.

Before opening an email, make certain the sender is a known person to you and/or that it is an expected communication. Don’t open attachments in emails unless you know who sent the email, what the attachment is, and double check that the email is the exact email address from the sender you know. Here are a few reminders and tips:

 

  • A “spoofed” email can mimic a trusted email or domain by using different letters or numbers to appear only slightly different than the original. A “spoofed” email can disguise the “From” field to be the name of the trusted source. For example, the email may look like it’s from your advisor or friend, however when you hover (but don’t click) over the email address it’s something else entirely.
  • Do not take quick or serious action in response to an alarming email. Cybercriminals often hope for the instinct of panic, fear, and urgency to kick in. For example, the IRS will never email you requesting your personal information and your “friend” is not going to message you to ask you to wire them money in an emergency. The more time you give yourself to stop and think, the better (visit the official IRS website for information, call your friend to check in on them, etc.) Bottom line: Go straight to the source.
  • Never email your accountant, financial advisor, business partner, or family member anything that has sensitive information (i.e. account numbers or social security). Use portals, encryption software, or password protection. Using portals and other secure methods like e-signing takes time, but that extra 10 minutes in the present could save you weeks of headaches in the future cleaning up after an identity theft attempt.

 

Your Devices (computers, phones, tablets)

 

  • Back your data up regularly. Take advantage of cloud-based services to back up photos and important documents. This applies to phones, home computers and laptops. This will enable you to recover data in the event your device is lost, stolen, or damaged.
  • Ensure your devices (computer, tablets, cell phones, smart watches, e-readers, etc.), various programs, and virus protection software are all up to date and set to auto-update.
  • Check your security settings on your web browser and applications—make sure they’re strong.
  • Turn off Bluetooth when not needed.
  • Log out of websites completely upon exiting.
  • Do not transact over public Wi-Fi. If you can’t avoid public Wi-Fi, stay away from sensitive information or transactions, use only secured sites, and turn off “sharing.” Use your smartphone as a hotspot instead of public Wi-Fi.
  • Practice social media safety. Be cautious when accepting “friend” requests on social media, following links, or clicking on a video inside a message. Avoid online quizzes and sharing personal details.
  • Enable multi-factor (two-factor, two-step) authentication for all available applications.

 

Your Passwords

 

  • Use strong, unique passwords or passphrases. The longer the better.
  • Don’t use personal information as part of your login ID or password.
  • Never reuse passwords (even on seemingly harmless websites).
  • Never write a password in an email (even in a separate email).
  • Consider using a password manager.

 

 

We hope this list is not overwhelming, but instead provides you with some information and tips that can help protect you and your family from cybercrime.

Visit these sites for more information on the latest cybercrimes and the best practices to avoid becoming a victim:

 

National Cybersecurity Alliance

Federal Trade Commission (FTC) Consumer Advice

FDIC Consumer Assistance & Information

FBI Scams and Safety


Content contributed by Diana Lormand, FPQP®, Senior Client Service Specialist

Modera Wealth Management, LLC (“Modera”) is an SEC registered investment adviser. SEC registration does not imply any level of skill or training. Modera may only transact business in those states in which it is notice filed or qualifies for an exemption or exclusion from notice filing requirements. For information pertaining to Modera’s registration status, its fees and services please contact Modera or refer to the Investment Adviser Public Disclosure Web site (www.adviserinfo.sec.gov) for a copy of our Disclosure Brochure which appears as Part 2A of Form ADV. Please read the Disclosure Brochure carefully before you invest or send money.

This article is limited to the dissemination of general information about Modera’s investment advisory and financial planning services that is not suitable for everyone. Nothing herein should be interpreted or construed as investment advice nor as legal, tax or accounting advice nor as personalized financial planning, tax planning or wealth management advice. For legal, tax and accounting-related matters, we recommend you seek the advice of a qualified attorney or accountant. This article is not a substitute for personalized investment or financial planning from Modera. There is no guarantee that the views and opinions expressed herein will come to pass, and the information herein should not be considered a solicitation to engage in a particular investment or financial planning strategy. The statements and opinions expressed in this article are subject to change without notice based on changes in the law and other conditions.

Investing in the markets involves gains and losses and may not be suitable for all investors. Information herein is subject to change without notice and should not be considered a solicitation to buy or sell any security or to engage in a particular investment or financial planning strategy. Individual client asset allocations and investment strategies differ based on varying degrees of diversification and other factors. Diversification does not guarantee a profit or guarantee against a loss.

Certified Financial Planner Board of Standards, Inc. (CFP Board) owns the certification marks CFP®, CERTIFIED FINANCIAL PLANNER™, and CFP® (with plaque design) in the United States, which it authorizes use of by individuals who successfully complete CFP Board’s initial and ongoing certification requirements.