Text

5 Spookily Good Cybersecurity Tips

Cybersecurity is not just for your IT Security team – it starts with each one of us. Whether we are at home or work, in today’s environment cybersecurity is essential and should be top of mind for all of us all the time. October is National Cybersecurity Awareness month and is a great opportunity to remind us of what we should be doing, both personally and professionally.

Here are five tips from the Department of Homeland Security to help us further Cybersecurity Awareness:

  • Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.
  • Technology has its limits. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices to prevent data breaches. For more information about smart technology see the Internet of Things Tip Card.
  • Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it. And, set your security software to run regular scans.
  • Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and finance departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment or share PII on social media platforms. Read the Social Media Cybersecurity Tip Sheet for more information.
  • It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links and delete suspicious messages immediately. For more information about email and phishing scams see the Phishing Tip Sheet.

Fraudsters are always looking for ways to cultivate information, that means it is up to every one of us to do what we can to protect not only our own information but that of our organizations and our account holders. Cybersecurity is more than an IT function, it is everyone’s responsibility.

For more information on how you can be cyber safe, please visit the NCSAM website.

Stay In-the-Know about Fraud

Don't let the payments industry throw you a curveball! Stay on top of the latest compliance and fraud issues currently impacting the payment space with our Quarterly Compliance and Fraud Review webinar. Join us on December 13th as we examine the latest threats and challenges circulating the payments industry so that your organization can plan a proactive response. Register now!