Cybersecurity Common Threats & Best Practices
In our increasingly digital world, cybersecurity is paramount. This blog post highlights common cyber threats and provides succinct best practices to protect yourself.
Phishing Emails: Be cautious of suspicious emails. These can often contain errors in spelling or greetings, as well as inconsistencies in email addresses and links. Avoid clicking on any suspicious attachments or unfamiliar extensions. It's essential to verify a site's security, keep your browser and antivirus software updated, and refrain from sharing personal information.
Smishing or phishing by text (SMS): Malicious actors use unexpected texts to deceive users into revealing personal information. Be cautious of unwarranted texts from unknown numbers. Instead of clicking on links, log in to your accounts directly.
Quishing (QR Phishing): This malicious tactic involves sending a fake QR code to deceive users into revealing sensitive information. Avoid clicking on unfamiliar QR codes and verify the need for updates by logging in directly rather than using a QR code.
Compromised Credentials: Unwanted access to credentials is a common issue. Implement multi-factor authentication (MFA) when available and create strong, unique passwords. Sharing passwords or saving them in browsers should be avoided.
Credential Stuffing: This occurs when malicious actors use stolen credentials to access various accounts. Prevent this by using unique passwords for different sites and avoiding easily guessable security questions.
Identity Theft: Identity theft involves using personal information for fraudulent purposes. Stay cautious while using public Wi-Fi and practice secure password usage. Implement multi-factor authentication whenever possible. Beware of phishing, smishing, and spoofing campaigns. Malware can be installed by opening unexpected emails, so approach them with caution.
Best Practices: For safe web browsing, ensure your browser and devices are up to date. Secure your home Wi-Fi by changing the default password and enabling encryption. Use network segmentation with guest networks and maintain an up-to-date firewall. When using AI tools, be aware of the information you submit and avoid sharing sensitive data. Lastly, implement multi-factor authentication for added security, which can include biometric and time-based factors.
Prioritizing cybersecurity in our digital age is important to combat increasing cyber threats and to align with recommended best practices.
This information comes from Madison Dewey, Business Risk Assurance Associate withFairview Cyber, whose article Cybersecurity Common Threats & Best Practices appeared in the September 2023 edition of NSCP Currents. To receive important information such as this and to review the risks and the associated compliance and supervision suggestions, join NSCP today to receive NSCP Currents and stay up to date on issues such as this that matter most for the financial services industry. Members can access thefull article here.