Tag Archives: secure

Cybersecurity Check: How Secure Are Your Actions?

cyber

It’s 2020 and more than time to be certain your cybersecurity practices are up to date. Cybercriminals become more advanced and attuned to the different ways to penetrate vulnerabilities of those who aren’t up to date on security. These are the top actions you need to take. Can you say yes to any of these?

Are you cautious with the applications on your phone?

Sometimes, there’s a false sense of security when it comes to phone applications. Apps are used for about everything these days and too often users think they are safer than they are. You may have noticed that pop ups can still occur on these applications and can pose a security risk to you and the information held on your device. You may even click on the ad accidently while it takes you to a suspicious website. 

Is your software up to date?

Yes, we realize that having to update your phone or computer can be a nuisance. It can be frustrating at times because it may change the layout of certain features on your phone. Yet, we would still recommend updating due to the protection it provides. It will help to patch vulnerabilities and fortify your wall of protection. 

Are you aware of phishing scams?

How attuned are you to phishing scams? Phishing is when the cybercriminal acts like someone else in order to trick the victims. Be sure to: never open an email from someone you don’t know, click on unfamiliar links and always be suspicious when it comes to emails – even from friends that may send harmful links unknowingly. 

Are your passwords updated periodically?

It’s frustrating to have to remember many different passwords and to constantly be updating them. But it is still less of a headache than it would be if you had your identity stolen or your data held for ransom. Never use the same password twice and update each password at least once a year. 

Is your PII Personal?

PII stands for personal identification information. This includes your address, birthdate, birthplace and middle name. These are often listed on many people’s social media pages. Sometimes all it takes to have your identity stolen is your full name and birthdate. Be sure to remove this from your pages and to keep it private. 

For more tips on how to stay ahead of the cybersecurity curve, contact us today!

Stay Secure While Staying Connected: Top Myths of Security

secure

It’s nearly unavoidable to have some semblance of a social life if you are not using technology to connect with the outside world. From social media and texting to phone applications, we are always connected. Many are uninformed of how to maintain this social connection while at the same time protecting themselves from the most basic security threats. We are combating this by busting the most common notions or myths about cybersecurity.

MYTH: Hackers aren’t interested in what I have.

If you have a social security number, hackers are interested in you. Even if you feel like your personal wealth is not very high, your social security number is incredibly valuable. With your number, they can conduct financial theft by applying for loans and credit cards in your name. They could also use your number to incur their healthcare costs or even legal obligations. In an even darker scenario, your identity can be sold to other hackers to use over and over again. Thereby creating a tumultuous problem. Realize that you have something worth protecting!

MYTH: My email application blocks all of the spam for me.

It only takes one accidental or wrong click to open yourself up to malware. And as great as some email applications are, they aren’t able to block every suspicious email from entering your inbox. Did you know that 1.5 percent of spam emails are malicious? Considering how many you likely get in a day, you are at risk every time you click. There are many ways to add additional filters to your email, but the best line of defense is actually you. If you have even the slightest suspicion about an email, report it. Only communicate with those you know without a doubt are secure sources.

MYTH: I’d be safer to go off the grid.

While it may sound alluring to some nomads, unplugging from digital connection can put you in a position of higher risk. This is because there is less day to day monitoring of your accounts. This makes your accounts a terrific target for hackers to attack and go by unnoticed.

MYTH: I have cybersecurity software, so I am not at risk.

If you’ve invested in anti-virus software, good for you for taking steps to protect yourself! However, hackers are becoming more advanced and finding ways to bypass hundreds of protective measures every day. Also, they can still attack you from other sources such as social media. A great way to combat this is to never click on unfamiliar links and to limit the information you put on social media, including your birthdate.

Stay safe while staying connected with these great tips. Remember, we offer safe and secure banking products to keep your information protected. For maximum security, you need cutting-edge identity management services that monitor a full range of credit and non-credit information that are used to perpetrate fraud. Heartland Bank offers LifeStages and FraudScout® Identity Monitoring Services.