Edit ModuleShow Tags

How to Protect Yourself from Cyberattacks

Here are some steps to help shield you from dangerous cyber threats


Published:

Given the growing frequency and severity of cyberattacks, it’s no surprise that cybersecurity remains top of mind for many investors.

Anyone reading the headlines knows cyberattacks are on the rise; indeed, malware, viruses, phishing and spam are problematic. Often, hackers infiltrate targeted computer networks to corrupt crucial data files or steal personal, proprietary or financial information.

In fact, a recent Morgan Stanley poll of high net worth investors showed that data security was a leading concern, with some 72 percent saying identity theft eclipsed other worries such as terrorism (65 percent) and illness (56 percent).

In 2016, six out of every 100 consumers were victims of identity theft. Online card transaction fraud increased by more than 40 percent last year and account takeover fraud increased more than 60 percent.

Here are some steps you can take to help shield you from dangerous cyber threats:

  • SIGN UP FOR AN IDENTITY THEFT PROTECTION SERVICE: These services provide advanced detection and notification, as well as ongoing regular monitoring across all your accounts. Many of them can also act as a single point of contact to flag and resolve unusual activity.
  • INITIATE A FRAUD ALERT WITH ANY OF THE THREE MAJOR CREDIT BUREAUS: This initial security alert notifies potential credit grantors to verify your identification before extending credit in your name.
  • FREEZE OR LOCK YOUR CREDIT FILE WITH ANY OF THE THREE MAJOR CREDIT BUREAUS: A security freeze is designed to prevent credit, loans and other services that require a credit check from being approved in your name without your consent. No one can access or make changes to your credit report while it’s frozen. You may unfreeze your account temporarily when needed.
  • MONITOR YOUR FINANCIAL ACCOUNTS: Review your transactions regularly, consider setting up alerts to identify potential fraudulent charges and cancel or freeze cards if you notice unauthorized activity.
  • USE INSTITUTIONS THAT PROVIDE ENHANCED USER/TWO-FACTOR AUTHENTIFICATION AND PROACTIVE ACCOUNT ACTIVITY REVIEW: Ask your bank or financial institution about their investment in cybersecurity and fraud-prevention technology.
  • FILE YOUR TAXES EARLY. Waiting until the last minute to file taxes could give criminals the opportunity to make a fake filing. You should also respond to outreach from the IRS right away.
  • IMPROVE YOUR ONLINE HABITS. Create complex, varied passwords and usernames. Use caution with unfamiliar websites, social media and emails. Encrypt your Wi-Fi services.

The most important action is to remain alert. In the event you are affected by a data breach, follow up with the corporation that was breached by contacting their fraud or customer service department to find out what steps you can take, if any, to protect your information. Being informed and proactive can help mitigate the risks associated with online identity theft and any data breach.

Edit Module
Todd Hauer

Todd Hauer is a Financial Advisor with the Global Wealth Management Division of Morgan Stanley Smith Barney in the Denver Tech Center. He can be reached at 720-488-2406 or toll free at 1-800-347-5099, or you can email him at Todd.Hauer@morganstanleysmithbarney.com.

Get more content like this: Subscribe to the magazine | Sign up for our Free e-newsletter

Edit ModuleShow Tags

Archive »Related Articles

10 Things I Learned About Veteran Entrepreneurs

What is it about military veterans that make them well-suited to success in entrepreneurial ventures?

Par Would be a Winning Score for Denver Golf in 2018

Golf has merely held steady, at par for the course.

Unicorns Vs. Zebras: The Importance of Responsible Tech

‚ÄčThe startup model and network that makes these end-goals possible, is infamously characterized by a high level of competition, exploitation of workers and users, emphasis on profit at all costs and generally predatory business practices.
Edit ModuleShow Tags
Edit ModuleEdit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags