- Home
- Resource Center
- Education
- C&N Library
- Trust&Protect Part 2: How to Keep Your Information Safe Online
Trust&Protect Part 2: How to Keep Your Information Safe Online
- Category:
- Security
- Author:
- Pete Boergermann
- Date:
- 10/11/23
Trust&Protect is our 4-part guide to financial safety designed to provide you with peace of mind. In the second part of our series, we discuss a few measures you can take to greatly reduce the vulnerability of your personal information online.
Multifactor Authentication
A growing trend in security technology is multifactor authentication, often referred to as “MFA.” For those who don’t know what multifactor authentication is, it is an additional layer of security beyond username and password. These layers are typically presented as requiring at least two of these verification methods:
- A knowledge verification, such as a password or security question
- A possession verification, such as email or SMS/text code retrieval
- An inheritance verification, such as a fingerprint or other biometric authentication
You likely use a form of multifactor authentication to access digital banking accounts due to regulations in the financial industry. As cybersecurity attacks continue to increase, more and more systems are either requiring or have some type of multifactor authentication available to their users. Many payment apps, social media platforms and even streaming services offer multifactor authentication. Because this step alone can reduce your risk of identity compromise by as much as 99.9% over passwords alone, we highly recommend setting up multifactor authentication on every service that offers it.
Use Strong Passwords
While multifactor authentication will greatly reduce your risk of cyber attacks over passwords alone, that doesn’t mean that you should simplify your passwords. Instead, passwords should be viewed as the first line of defense against a sophisticated threat that works in conjunction with MFA. You should avoid passwords that can easily be guessed or researched, such as
- Names, such as your own, your children or your pets
- Birthdays
- Your well-known interests, such as sports teams
- Places you travel
- Other common passwords, such as asdfjkl; or 123456
Instead, we recommend using pass phrases that use a combination of upper- and lower-case letters, symbols and numbers. Pass phrases are easier to remember and harder for hackers to guess. It is also good practice not to use the same password for all logins, because a hacked password on one system will leave other systems you use vulnerable. Some ways you can further protect your password include:
- Never send a password through email
- Do not share your passwords or leave them written down in an easily found place
- Do not use ‘remember password’ options on devices that other people use
- Be mindful of public wi-fi
- Choose a password that is at least 10 characters in length
- Look for the ‘s” in the ‘https://’ portion of the url. Sites that just have ‘http://’ are vulnerable or could be a phishing scam, which we will go over in Part 3
- Be careful of using your password through email links, as they could also be part of a phishing scam
- Do not reuse your password
Update Your Software
Cyber criminals are constantly searching for vulnerabilities in system software. In response, software companies are constantly upgrading their systems to keep their customers safe. This is why you should always update your device’s operating system as soon as they are made available. When you think about the amount of personal information on your cell phone, tablet or PC (such as credit card information, photos, personal information, etc) you realize how susceptible you would be if hackers were able to break into your device. Software updates are designed to help you keep that information out of reach from cyber criminals.
If your device allows for automatic updates, we recommend that you turn those on so that your device remains a step ahead. If your device does offer automatic updates, we still recommend that you periodically check for updates manually to make sure they aren’t being missed. It is also good practice to uninstall any applications that you are no longer using or are outdated. You can always reinstall the application if you need it later.
Back Up Your Files
While backing up your files doesn’t seem like it would directly neutralize cyber security threats, it could, in fact save you a lot of money. In Part 3 of our series, we will discuss Ransomware and how it works in more detail, but the short story is that it is a type of malicious software that will permanently block the files on your device and hold them hostage until a ransom is paid. You can read our C&N Library article about Ransomware, too, which has some great information on how you can protect yourself from a Ransomware attack.
If you continuously back up your files offline using a separate source, you can easily circumvent this type of attack and restore your files. You can then identify how your device was infected and take steps to restore your device at a much lower cost than paying the ransom.
Cyber threats are not going away, so it’s important to know what steps you can take to reduce the risk to your personal information online. In Part 3 of our Trust&Protect series, we’ll help you identify common cybersecurity scams so you can recognize them before it’s too late.
Pete Boergermann joined C&N in 1998. In his role as the Director of Information Security, he is responsible for managing the information security program at C&N, while also championing IT security to make it a critical part of C&N’s business operations. Pete has previously served as Information Technology Manager/Information Security Officer.
A United States Air Force Veteran, Pete graduated from the BAI Graduate School of Bank Operations through Vanderbilt Owen Graduate School of Management in 2006 and completed the PA Bankers Association’s (PBA) School of Banking in 2009. He earned his credentials as a Certified Information Executive from USC Upstate Campus’s Institute for CIO Excellence in 2016. He also puts his expertise to valuable use as a co-chair of the PA Bankers IT Technology Committee and Chair of the PA Bankers Cyber Sub-committee.
In his spare time, Pete serves as a School Board Member of New Covent Academy and as an Elder at the Church of the New Covent and volunteers for Susquehannock Trail Performance Rally. He lives in Wellsboro with his wife, Cassie, and has three daughters, Alyssa, Joy and Mikaela.