We are pleased to provide you with tips and suggestions to help keep you safe.
Clean Up Your Cyber Footprint
Each of us is a valuable part of the cybersecurity chain, including our children, workers, older individuals, and students. From connecting with friends on social networks to managing finances online, we enjoy the convenience and efficiency of digital lives, but with the benefits also come risks. The personal information we share online while banking, shopping, and posting on social media presents an opportuntiy for cyber criminals to steal our sensitive data to commit crimes.
We learn about new scams, frauds, and databreaches almost daily. You don't have to be "tech savvy" to be safe safe online. To help protect yourself, the Department of Homeland Security and Old Fort Bank encourage you to follow these simple tips:
Lock Down Your Login: Usernames and passwords are often not enough to protect important accounts like email, banking, and social media. Fortify your accounts by enabling the strongest authentication tools available, such as multi-factor authentication for online accounts, and fingerprint identification and security keys to lock your mobile device.
Keep a Clean Machine: Regularly update the software on your Internet-connected devices, including PCs, smartphones, and tablets, to reduce the risk of infection from malware.
Treat Personal Information Just Like Money: Information about you, such as your purchase history and location, has value - just like money. Protect your data by being cautious about how your information is collected by apps and websites.
Own Your Online Presence: Control and limit who can see your information online by checking the privacy and security settings on your accounts and apps. Anything you post publicly could potentially be seen by a cyber criminal, so keep your information private.
Share With Care: Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it could be perceived now and in the future.
Protect Yourself From Identity Theft
Someone gets your personal information and runs up bills in your name. They might use your Social Security or Medicare number, your credit card, or your medical insurance – along with your good name. How would you know? You could get bills for things you didn’t buy or services you didn’t receive. Your bank account might have withdrawals you didn’t make. You might not get bills you expect. Or, you could check your credit report and find accounts you never knew about.
Here’s what you can do:
- Protect your information. Put yourself in another person’s shoes. Where would they find your credit card or Social Security number? Protect your personal information by shredding documents before you throw them out, giving out your Social Security number only when you must, and using strong passwords online.
- Read your monthly statements and check your credit. When you get your account statements and explanations of benefits, read them for accuracy. You should recognize what’s there. Once a year, get your credit report for free from AnnualCreditReport.com or 1-877-322-8228. The law entitles you to one free report each year from each credit reporting company. If you see something you don’t recognize, you will be able to deal with it.
Want to learn more? Sign up for Consumer Alerts at ftc.gov/stay-connected
Please report Identity Theft
If you suspect identity theft, act quickly. Please report it to the Federal Trade Commission.
- Call the FTC at 1-877-FTC-HELP (1-877-382-4357) or TTY 1-866-653-4261
- Go online: ftc.gov/complaint
The FTC operator will tell you the proper steps to take. Visit ftc.gov/idtheft to learn more.
Best Practices for Mobile Device Security
Configure your device to require a passcode to gain access and/or Touch ID security.
Avoid storing sensitive information. Mobile devices have a high likelihood of being lost or stolen, so you should avoid using them to store sensitive information. If sensitive data is stored, enable encryption to secure it.
Keep your mobile device’s software up to date.
Disable features not actively in use, such as bluetooth, Wi-Fi, and infrared. Set bluetooth-enabled devices to “non-discoverable” when bluetooth is enabled. Delete all information on a device before the device changes ownership. Use a “hard factory reset” to permanently erase all content and settings stored on the device.
“Sign Out” or “Log Off” when finished with an app, rather than just closing it.
Do not jailbreak or otherwise circumvent security controls. (Jailbreaking removes the manufacturers security restrictions on your phone.)