{"id":137,"date":"2017-12-01T19:31:36","date_gmt":"2017-12-01T19:31:36","guid":{"rendered":"https:\/\/rm73v2idht.onrocket.site\/?p=137"},"modified":"2022-11-22T18:49:30","modified_gmt":"2022-11-22T18:49:30","slug":"tis-the-season-for-cyber-security","status":"publish","type":"post","link":"https:\/\/blog.integrityfirstins.biz\/?p=137","title":{"rendered":"&#8216;Tis the Season for Cyber Security"},"content":{"rendered":"<p><a href=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-140\" src=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283-300x300.jpg\" alt=\"02J68283\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283-300x300.jpg 300w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283-150x150.jpg 150w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283-768x768.jpg 768w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/12\/02J68283-1024x1024.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>As the holiday season draws near, so do cyber criminals. \u00a0With more and more people shopping online, the number of potential cyber breach victims increases every day. \u00a0In fact, Adobe is predicting that Black Friday 2017 will see the highest sales ever on record.<\/p>\n<p>So, without completely withdrawing from the online world, how can you protect yourself and your business online? \u00a0Try applying the following tips:<\/p>\n<p><strong><i>Make sure that you are on the website that you think that you are on<\/i><\/strong><\/p>\n<p>One of the most common ways to scam your username and password or credit card information from you is to send you to a fake website that looks very similar to the website that you are expecting. \u00a0An example of this is paypal.com versus paypa1.com. \u00a0Note that the only difference is the \u201cL\u201d at the end of the first one and there is a \u201c1\u201d at the end of the second one.<\/p>\n<p>To get you to these fake sites, scammers will send you an email that directs you with a bogus link. \u00a0One way to see where the link is taking you is to hover over it with your mouse. \u00a0The website address will popup. \u00a0If the link is bad, block the email sender and move the email to your \u201cSPAM\u201d folder to prevent receiving emails from that person in the future.<\/p>\n<p>One way to confirm that you are visiting the website that you want is for you to type the website into the address bar. \u00a0This way, you know that you are not following any false links and you arrive at the correct website.<\/p>\n<p><strong><i>Don\u2019t fall for holiday phishing schemes<\/i><\/strong><\/p>\n<p>On Black Friday 2017, retailers sent over 3 BILLION emails to consumers, advertising their best deals and sales. \u00a0This day was also filled with scammers sending out tons of emails, pretending to be a retailer. \u00a0They were taking advantage of the fact that consumers were expecting to receive these emails and may not have questioned them as much. \u00a0This is known as phishing and its main purpose is to collect as much personal information about you as possible.<\/p>\n<p>Commonly, phishing emails will try to direct you to a login page or a payment page. \u00a0They want to get your information as quickly as possible without you questioning the validity of the site.<\/p>\n<p>A few ways to identify phishing schemes:<\/p>\n<ul>\n<li>The \u201cFrom\u201d field display name is a store or bank. \u00a0However, when you click into it to reveal the full email address, it\u2019s an address not related to that entity.<\/li>\n<li>The email has graphics that look \u201coff\u201d or \u201cfuzzy\u201d. \u00a0Sometimes, to make the fake email look more legitimate, a scammer will copy the graphics from a store or bank from their website, which are not a high resolution. \u00a0As a result, when they are placed into an email, they look wrong.<\/li>\n<li>When you hover over the link that the email wants you to visit, it is not pointing to the website that it claims to be sending you to.<\/li>\n<li>Check for spelling mistakes and bad grammar. \u00a0Legitimate companies are sticklers when it comes to spelling and grammar. \u00a0If the email sounds poorly written, there is a good chance that the email is not legitimate<\/li>\n<\/ul>\n<p><strong><i>Check for an SSL certificate upon checkout<\/i><\/strong><\/p>\n<p>When you check out online, you want to make sure that there is an SSL certificate in the address bar. \u00a0You should see that the web address starts with \u201chttps:\/\/\u201d. \u00a0Normally, there will be a lock image next to the address or the whole bar will turn green.<\/p>\n<p>An SSL is important any time that you are entering financial information or passwords. \u00a0This encrypts that information and keeps it private from anyone that may be watching your transaction.<\/p>\n<p><strong><i>Create a strong password (and don\u2019t use the same one) for your customer (and business) accounts<\/i><\/strong><\/p>\n<p>Your customer accounts for stores and banks should be protected by a strong password. \u00a0The company can have the best security measures and encryption in place, but if your account has an easily guessed password, none of that matters.<\/p>\n<p>A strong password is 12 characters or more and contains at least one of each of the following:<\/p>\n<ul>\n<li>Uppercase letter<\/li>\n<li>Lowercase letter<\/li>\n<li>Number<\/li>\n<li>Symbol<\/li>\n<\/ul>\n<p>You also do not want to use the same password for all of your accounts. \u00a0This is because if one of the accounts is hacked, the hacker now has the login information for all of your other accounts and they WILL check this immediately.<\/p>\n<p>The average American has over 60 online accounts that they have to remember, so look into a good password manager to help you maintain the information. \u00a0Not only will the password manager help you remember all of your login information, but it will help you create secure passwords.<\/p>\n<p>Some highly rated password managers include KeePass, Dashlane and LastPass. \u00a0Check out this article from PC mag for more information on the top password managers of 2017: <a href=\"https:\/\/www.pcmag.com\/article2\/0,2817,2407168,00.asp\">https:\/\/www.pcmag.com\/article2\/0,2817,2407168,00.asp<\/a><\/p>\n<p><strong><i>BONUS: Turn on two factor authentication where possible<\/i><\/strong><\/p>\n<p>Two factor authentication (TFA) is becoming more prevalent as hackers become more savvy and have access to greater computing power. \u00a0TFA uses not only your username\/password, but one other means of verification before you have access to your account.<\/p>\n<p>This is now commonly available with banking and credit card websites. \u00a0When you turn this on, after you sign in with your username and password, they will ask if you want to receive a text or email for secondary verification of the account. \u00a0Once you make your selection, they will send a one-time only code to the phone number or email associated with that account, which you then have to enter to gain access.<\/p>\n<p>This is helpful because even if someone had your password, they would still need access to your email or phone to be able to access your account. \u00a0If TFA is available to you, INF recommends turning it on to better protect yourself.<\/p>\n<p>Have a safe and secure holiday season from INF!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the holiday season draws near, so do cyber criminals. \u00a0With more and more people shopping online, the number of potential cyber breach victims increases every day. \u00a0In fact, Adobe is predicting that Black Friday 2017 will see the highest &hellip; <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=137\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,5,17],"tags":[],"class_list":["post-137","post","type-post","status-publish","format-standard","hentry","category-about-inf","category-cyber-liability-insurance","category-risk-management"],"_links":{"self":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=137"}],"version-history":[{"count":3,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/137\/revisions"}],"predecessor-version":[{"id":142,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/137\/revisions\/142"}],"wp:attachment":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}