Gilbert Wealth Articles

How to Protect Yourself from Cyber Crimes

Comments Off on How to Protect Yourself from Cyber Crimes

Identity Theft is a Problem

40%

Source: 2019 Experian

$4,930

Source: U.S. Department of Justice, Javelin Strategy & Research

200

Source: SANS Institute

What can you do to prevent this?

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War
Source

1

Know the Enemy

What information are cyber criminals seeking and how do they get it? What tactics do they use in their attacks? These questions are important first steps in protecting yourself online.

What is it?
Cybercriminals pretend to be a trustworthy source in order to acquire sensitive personal information such as usernames, passwords, social security numbers, and credit card details

What does it look like?
An email from a seemingly legitimate email address instructs you to click on a link to take action (e.g., “validate your account,” “confirm your identity,” “access your tax refund”). The link brings you to a website requiring you to enter your personal information

What’s the impact?
Victims of phishing may have malware installed on their computer systems or have their identity stolen.  

How can you defend against it?

1) Hover over questionable links to reveal the true destination before clicking. 

Hover over link before clicking

2) Beware that secure websites start with https, not http.

HTTPS on Website

What is it?
A fake email header that gives the impression the email is from someone or somewhere other than the actual source, with the goal of tricking the recipient into opening and responding to the email. Phone spoofing is a comparable common cyber threat using a similar phone number.

How does it happen?
The cybercriminal creates an email address nearly identical to your email address (i.e., off by a character).

What’s the impact?
Similar to the other cyberattacks we’ve discussed, your money is stolen, and you become the victim of fraud and/or identity theft.

How can you defend against it?

1) Carefully check the incoming emails for the proper email address and the accuracy of the spelling of the sender’s name. 

2) If an email or phone call are questionable, contact the sender directly, using the email address or phone number you have on file for that individual.

What is it?
This involves manipulating or impersonating others to divulge sensitive, private information, and then demanding financial transactions be executed to avoid consequences.  

What’s the impact?
The cybercriminal commits fraud, steals your money, and disappears.

How can you defend against it?

1) Be selective about who you allow to join your social networks. 

2) Be cautious about the information you choose to share on social media, keeping your personal information private (e.g., home address, phone number, employer, vacation dates, birthdate).

How does it work?
Malicious software is created to damage/disable computers and computer systems, steal data, or gain unauthorized access to networks.

What does it look like?
Examples of malware include viruses, worms, trojan horses, ransomware, and spyware.

How does it happen?
Malware may be installed on a computer when a user clicks an unsafe link, opens an infected file, 
or visits a legitimate website that could contain adware.

  • Nearly 20% of all internet users experienced a malware attack of some kind. Source: Kaspersky Security Bulletin  ‘19
  • 94% of malware was delivered by email. Source: 2019 Verizon Data Breach Investigations Report
  • The #1 disguise for distributing malware– fake invoices. Source: 2018 Symantec Internet Security Threat Report
  • A man stole over $100 million from Google and Facebook between 2013 and 2015 by sending fake invoices. https://www.npr.org/2019/03/25/706715377/man-pleads-guilty-to-phishing-scheme-that-fleeced-facebook-google-of-100-million

What’s the impact?
Malware can delete files or directory information, or it may allow attackers to covertly gather personal data, including financial information and usernames and passwords.

How can you defend against it?

1) Install the most up-to-date antivirus and anti-spyware software on all devices that connect to the Internet and run regular scans to update the software when available.

2) Make sure your networking equipment and computers are all still supported by the manufacturer.

2

Know Yourself

Fortunately, we are not helpless against cyber criminals. Here are some tips on strategies to reduce the risk that cyber criminals have on your financial plans.

Username & Passwords

Do

Don't

80% of confirmed data breaches involved compromised or stolen passwords. Source: Verizon 2019 Data Breach Investigations Report

Sharing Information Online

Do

Don't

Email

Do

Don't

Equipment

Do

Don't

60% of data breaches were linked to vulnerability where a patch was available but not applied. Source: 2019 Ponemon Costs and Consequences of Gaps in Vulnerability Response

How Gilbert Wealth Protects Your Data

Steven Gilbert

Steven Gilbert CFP® is the owner and founder of Gilbert Wealth LLC, a financial planning firm located in Fort Wayne, Indiana serving clients locally and nationally. A fixed fee financial planning firm, Gilbert Wealth helps clients optimize their financial strategies to achieve their most important goals through comprehensive advice and unbiased structure.