In these unprecedented times, many of our clients are working, studying, and entertaining their families from home—and relying on technology more than ever.
- Ensure your remote access technology, software, and applications are up to date.
Remote access technologies have known vulnerabilities and are all too often the weak link that cyber criminals use to gain access to your personal information. Make sure to update all software and applications, so that any known weaknesses are patched and you and your family are better protected.
- Only connect to the Internet through a secure network.When you connect to a public network, any information you share online or via a mobile app could be accessed by someone else. When accessing confidential information from your employer, use a Virtual Private Network (VPN) to encrypt your activity. Most organizations provide a VPN to their employees to ensure secure, remote access for work use, and personal VPN accounts are available from various service providers. If your kids are accessing a website for online learning, make sure your router software is up to date and you’re using a strong password that only your family knows.
- Use strong passwords.Many people use the same or similar version of a password for everything, even between work and home. Unfortunately, this means hackers can reuse a single stolen password on multiple sites to unlock dozens of accounts. While remembering secure and complex passwords for every account can be difficult, it can help to use password management software, which provides strong, unique passwords for everything.
- Use multifactor authentication.Traditional user login and password accounts are easy for cyber criminals to crack. Whenever possible, set up multifactor authentication on your accounts. This requires you to provide at least two authenticating factors, or proofs of identity, before you can access protected data, giving you a second line of defense against criminal activity. This additional level of protection is essential when you are accessing networks remotely, because bad actors will have a harder time accessing a private network.
- Only share information with actual friends and family on social media.While you and your kids are stuck at home or practicing social distancing, you may want to turn to social media to connect with friends and family. Just make sure you’re only sharing with people you know and use strong passwords. Cyber criminals constantly target social media accounts, so don’t let them in yours.
- Keep your smart toys and homes updated.Bad actors are finding ways to hack into smart appliances, homes, and toys – especially if they are not protected with strong passwords. Change the default password and update the software regularly. Keep an eye on how your children use their smart toys and turn them off during private discussions.
- Only click on links, open attachments, and download software from trusted resources.
While you may want to stay informed about the latest information, especially during periods of uncertainty, bad actors know this, and will attempt to take advantage of you by tricking you into thinking a malicious link is something important and informative. Once you click it, they can use that malicious link to gain access to your or your organization’s private information, and/or freeze the computers or networks. If you’re not sure about the source, go to the organization’s website. If it’s important, the information will be posted there as well.
- Verify website URLs before sharing confidential information.
Bad actors can easily create fake websites in which both the URL and homepage look remarkably similar to a site you trust – like your healthcare provider, bank, or email provider. Instead of following a link in an email, type the URL in by hand. Also, make sure the site you visit has HTTPS in the URL; these sites are more secure than those with HTTP.
- Don’t respond to requests for information from unknown sources – especially if the request is for personally identifiable information or passwords.
Bad actors attempt to con people into sharing confidential information by pretending to be someone you know or work with. Take extra care to identify who you’re sharing information with, before you share it – even if you think the request came from a trusted resource or organization. Don’t feel rushed; take the time to research the request and whether it’s appropriate before responding.
- Make sure you’re protected.
Many of the insurance carriers we work with offer proactive tools to help you keep your personal data secure or even offer Cyber Protection insurance or Identity Theft coverage.
This article was originally published by Chubb.