Safeguarding Against Cybercrime
Cybercrime. It’s a word that is more and more common in today’s world. It’s also something we take very seriously, always prioritizing and protecting your personal information. While cybercrime is a dangerous threat to your identity and assets, there are some things you can do to help safeguard them. We gathered a few tips to help.
- Be aware of suspicious phone calls or emails asking you to send money or disclose personal information. If you receive such correspondence call the company yourself with a known phone number to verify the request is valid.
- Never share sensitive information via email such as social security numbers, account numbers or birthdates.
- Beware of phishing and malicious links received by email. Urgent sounding emails are intended to make you react quickly without thinking about the content of the message and whether it is legitimate.
- Do not open links or attachments from unknown senders. Go to the website directly through your browser to find the information.
- Check your email and account statements regularly for suspicious activity. Intruders may make small transactions over time to try to go unnoticed.
- Never enter confidential information in public areas. Public wifi access is a common place for hackers to steal personal information.
- Create complex and unique passwords for each website you use, making sure to not use any personal information. Consider using a popular password manager system like LastPass or RoboForm.
- Maintain updated technology including web browsers, operating systems, anti-virus and anti-spyware applications.
Tips when working with Johnson Bixby
- Keep us informed of changes to your personal information. This allows us verify your identity when you call and provide accurate information to you.
- Expect a call or email from us when transactions are processed. We do our very best to keep you informed on any changes to your accounts so you will not suspect unauthorized transactions.
- Provide up to date estate planning documents including power of attorney forms so we can verify who we are legally permitted to talk to on your behalf.
Tune in next week for part 2 to discuss steps you can take if you are subject to a data breach.
Written By Haley Smart