Recognize that your private information has likely been made public through countless data breaches. Consider putting in place credit freezes and fraud alerts with the credit bureaus to prevent new lines of credit from being opened in your name.
Never Recycle Passwords
Using the same password for multiple online accounts and devices is a common mistake made when account takeovers occur. Consider a reputable password manager that will generate long and unique passwords for each online account.
Read Your Credit Report
Request a free copy of your credit report from annualcreditreport.com. This will allow you to receive one report every 12 months from each credit reporting company. Reviewing this information consistently will help spot signs of identity theft.
Invest in a Shredder
Make sure you properly dispose of sensitive data such as receipts, package labels with contact information, credit card statements, and financial records.
Think Before You Share
Fuel for social engineering attacks often comes from the information we willingly give away. Review privacy settings on social media accounts and think before you post pictures and personally identifiable information. You never know who might be looking.
Isolate Online Activity
Consider creating unique email addresses for the variety of online accounts used. Do not link an email address from less critical activity such as social media use or online publications to more sensitive accounts like banking or investments.
Password Recycling and Weak Credentials
Reusing passwords across multiple devices and services provides criminals easy access for account takeover attacks. No sophistication here. Create long and unique passwords for every device and account used online.
Malware and Ransomware
Cyber criminals can lock you out of a device holding all of your digital contents hostage. Family pictures, important documents and more become encrypted with threats to release it publically unless the monetary demand is paid.
Data Protection and Security Challenges
More people are now working remotely than ever before. Sensitive information is passed between personal and business computers and many are sharing devices at home for a variety of purposes. This puts data and devices at a greater risk.
Set Up Multiple Networks
Consider creating a “guest” network to separate non-essential connected devices such as smart appliances or visitors from the network you access your personal computer. This segmentation can help protect the primary network from malware or viruses spreading.
Outdated Hardware and Software
From performance to cybersecurity, not all IoT devices are created equally. Connected devices have grown in popularity creating “smart” but vulnerable homes. Not all manufacturers provide needed firmware updates and many users fail to apply software patches placing homes at risk.