By: Chimere Williams
The evolution of technology is a gift to humanity - cell phones can hold many apps that can assist one with managing every part of their life, watches are equipped with biometric data tracking features, and refrigerator magnets have been replaced with 32-inch screen hubs that display photos of precious memories. While these example devices are different in shape, size, and utilization, they share a common feature - the ability to connect to the internet and protect our information has to be a forefront priority because we do not want our precious information to get into the wrong hands.
Protecting Your Information from Cyber Attacks
The FBI has issued warnings about using Internet of Things (IoT) devices, which are often insecure and can be used as a point of entry for cybercriminals.
Business Email Compromise (BEC) is a sophisticated scam that targets businesses and individuals to perform transfer of funds. In 2022, the FBI's Internet Crime Complaint Center (IC3) received 21,832 BEC complaints with adjusted losses of over 2.7 billion. Historically, these schemes were associated with requests for W-2 records, compromised vendor email addresses, and fraudulent requests for large amounts of gift cards.
Tips for Protecting Your Information
Password Protection
The National Institute of Standards and Technology (NIST)recommends that passwords be at least eight characters.
Encryption
Encryption is the process of protecting information or data by using mathematical models to scramble it so that only the parties with the key to unscramble it can access it.
● Messaging App: WhatsApp
● Emails: Microsoft Outlook
VPN (Virtual Private Network)
Encrypts users' data and masks IP addresses; the users' browser history and location are untraceable.
Stay Vigilant
Credit Monitoring Services
Credit monitoring services charge consumers a nominal monthly fee to monitor their credit reports and alert them about any changes made to the listed accounts on the consumers' credit reports.
The U.S. Department of Justice recommends the following steps if one suspects that they are a victim of identity theft:
● Request and Review Your Credit Report
● Consider Placing a Fraud Alert on Your Credit File
If your identity has been compromised, requesting and reviewing your credit reports from the three nationwide consumer credit reporting companies is strongly suggested.
National Credit Reporting & Monitoring Companies
● Experian
● Equifax
● Transunion
● My FICO (Consumer Division of Fair Isaac)
"Be sober-minded; be watchful. Your adversary, the devil prowls around like a roaring lion, seeking someone to devour."
- 1 Peter 5:8, ESV
Minimizing the risks of security breaches will help safeguard critical information for you, your family, and your organization through continued awareness and implementation of safety measures. No one should have unauthorized access to you or those entrusted with your care.
The Writer
Hi there! My name is Chimere Williams. I am a proud mom and legal professional. I have always been passionate about family time, assisting with pro bono projects, and educating my community about legal resources.
In addition, Chimere enjoys waterfall trekking, Zumba, and Pilates. She firmly believes in Jesus Christ, the Holy Bible, walking by faith, not by sight, and being kind to others are important.
"Overall, I am a person who vigorously supports restorative practices and who is always looking to learn and grow. I am excited to see where life takes me, and I am grateful for all the experiences and opportunities that come my way."
Chimere writes topics on Personal Development for the Inspire To Hope blog.
Chimere Williams is a non-lawyer legal professional. Please note that this article is not intended to provide any legal advice. It is always recommended that you seek professional legal counsel if you have any specific legal questions or concerns.
Did you enjoy this post?
Let us know in the comments.
Inspire To Hope Resources:
Connect with us!
Apparel, books, and more...
Comments