4/26/2018 - By Rick Bullard
You are driving to a meeting with a new prospective client. Your boss calls and needs those reports for her meeting that starts in 10 minutes. Whipping into the local coffee shop with free wi-fi, you can shoot those reports out, buy a round of lattes for the meeting and still make it on time. Out comes the laptop as you find a small table in the corner, and you connect to the CoffeeShoppe_Guest wireless network. The New Email button is clicked, the reports are attached, you add the recipient and click Send. Whew! Check that off the list!
This event is something we could picture ourselves facing. But, did you just expose your personal information? Will you be a victim of cyber crime? The most frequent target for cyber criminals is personal information. The more they can collect about you and your life, the easier it is for them to open financial accounts in your name, and even impersonate you in communications with family, friends and business contacts. Now, more than ever, it is critical to protect this data as much as possible.
Risk mitigation requires varied steps and a vigilant approach to be successful. A single solution will not protect you; therefore, you need to adopt a comprehensive, layered solution! These tips can go a long way to ensuring that you proactively protect personal information.
1. Complex passwords are the first line of defense – Do not use the same password for all accounts, and make sure to change them on a regular basis.
2. Avoid publicly available access points.
3. “S” stands for Security - Even if you are using your own personal computer and have taken all actions to secure your device with complex passwords, make sure you are using a Secured website. You should see a lock that is closed, "https://", and in most cases the word "Secure". Sites without these visual indicators are ok to use and gather information from, but think twice before logging in to a user account!
4. Don’t click or call! – Stranger danger rings true on the internet. Unless you are sure about what you are clicking on, do not do it.
5. Think before you post - Be cautious concerning what personal information you put on social media, such as birthdays or anniversaries, and especially when you may be away from your home or office.
Click here to download a complete Cybersecurity Best Practices tip sheet. I hope that these tips can help you protect yourself from becoming the next victim of cyber crime! If you have any questions, please email me or contact a member of our Information Technology team.
About the Author | Rick Bullard
Rick is an IT consultant in the Information Technology Services Department of Saltmarsh, Cleaveland & Gund. In his role, Rick performs installation, server management, networking and end-user support for the firm’s clients. His areas of focus include creating efficient IT processes for a broad range of industries such as education, healthcare, and law enforcement agencies.