Don’t Be A Victim of Cybercrime: What You Need To Know

To sustain this free service, we receive affiliate commissions via some of our links. This doesn’t affect rankings. Our review process.

Lock on computer keyboard (Caption: Don’t Be A Victim of Cyber Crime: What You Need To Know)With so many recent cybersecurity breaches (especially from reputable companies like Target and Equifax), it has become increasingly necessary to become secure online. With so many access points (via smart home devices, fitness trackers, etc.), it’s easier than ever to fall prey to a potential hack.

Breaches can happen to the best of us, not just your vulnerable average Joe. Hackers have sophisticated ways of stealing your identity and could be accessing your accounts as we speak. Unlike a house break-in where there is often evidence of a crime, it is a lot easier for digital theft to go unnoticed. Are you leaving the front door wide open for these new-age criminals?

Article Overview

Tips For Secure Online Shopping

Millions of Americans shop online every day. That’s a lot of credit cards swiped, personal data collected and online transactions, resulting in a huge potential threat for identity theft.

Here are some tips to stay safe when snagging those online deals.

Pro Tip

Whenever possible, avoid using location-based services that publicly check you into a location or apps that use your position to track your whereabouts.

  • Turn On Two-Factor Authentication (2FA) – If a retailer offers it, this is an additional online security measure where a secondary device under your control is used to authenticate your identity. This is typically your smartphone, and common methods of implementation include receiving an email, text message, or phone call in addition to using your username and password to log in.
  • Check The “From:” Email Address – If you receive an enticing offer or sale via email, check the source of the email and examine the “from” email address. Lots of times the name will be spoofed to look like a friend, but the email address will be bogus. Caution – sophisticated hackers are also able to “spoof” the email address (fake it), so when in doubt, don’t click.
  • Links In Emails – Check The Source Code – your best bet is always to visit websites directly (vs clicking links in the email). But if you’re curious, you can view the source of an email (making sure not to click on any links) to see the actual URL’s behind the anchor texts (link names).
  • Update Passwords Ahead Of Time – It’s always a good idea to update your passwords regularly and make sure that each password is hard to guess and unique to that website or app. In anticipation of major holiday shopping events, reset the passwords for the sites you plan on shopping beforehand.
  • If It’s Too Good Of A Deal, It Probably Isn’t Legit – Spammers are prone to targeting people who don’t know any better, especially children. So teach your kids not to click on shiny objects or fall for unbelievable deals.
  • Phone with VPN on screen (caption: Guide to VPNs: virtual private networks)Only Shop At Secure Sites – Most retailers have switched to a secure connection (URL begins with HTTPS) by now but if not, buyer beware. Your browser should recognize sites that use a secure (SSL) connection and have a valid certificate, just make sure you’re using a major brand name browser (Safari, Firefox, Chrome, Internet Explorer, Edge, Opera) and keeping it up to date.
  • Use A VPN During Check Out – A Virtual Private Network (or VPN) masks your IP address (or internet location) making it more difficult for intruders to gain access to your information. VPN services can be used on your computer and smartphone. We also have a step by step guide on how to set up a VPN on various devices.

Did You Know?

Connection Is Secure Browser Message For SSL Website

Click the icon in your browser’s address bar to the left of the website URL for information on the website’s security certificate. The latest website browsers should block those who don’t comply to the new standard for encrypting your data, but not all do.

Stay Secure At Home And On The Road

How Many Of Us Are Vulnerable?

Nearly half of Americans have been exposed to some sort of cybercrime threat. How exactly do these hackers get access to our precious data? Our experts dig in to find out.

The traditional methods used to steal people’s identity (like dumpster diving and malware) are still in play, but nowadays your focus should be on the thieves you can’t see and the data you didn’t know they could access.

Here are some essential steps you can take to help prevent a personal data breach.

How To Create A Secure Password

The days of using your pet’s name, or the numbers in your street address (or heaven forbid the word ‘password’) as your password are over. Use these guidelines to create a secure password:

  • At least 8 characters randomly generated
  • Should include alphabetic, numerical, and at least 2 special characters (think *&@!#$%^).
  • We recommend a service such as Dashlane to store your passwords so each one can be unique. Dashlane can also generate passwords for you.

Lock Down Your Network

Cujo at home on counterYour router is the primary entrance into your residence for cybercriminals. Make sure your router password is unique and secure (we recommend at least 8 characters, randomly generated with at least two special characters. To take it a few steps further, you can also enable multi-factor login or better yet get a firewall for your smart home hub that acts as a shield to protect anything that’s connected to your WiFi via a wireless connection or your smart home hub or smart speaker.

Protect Your Devices

If you don’t have a password to unlock your phone and computer, stop what you’re doing right now and set this up. That will ensure no one can access the contents of your devices (like email and documents) if it is misplaced or stolen.

Device Location Finding Services

If you’re an Apple user consider turning on Find My iPhone (or Macbook, etc.) so you can track your device’s location. This can help retrieve it in the event of loss or theft. For a step up, consider the service Prey, a sophisticated security solution for locking down, tracking, and retrieving your device.

Don’t Pay Debit At The Pump

Have you ever pulled up to the gas station only to find every single kiosk says “see cashier” or “pay inside”? Sure it is an inconvenience but it may just save you from identity theft! Since gas station credit card machines are often unattended, it is fairly easy for savvy hackers to put card reading equipment (aka skimmer) on them. When you dip your debit or credit card into the reader, the skimmer swipes the data from your magnetic strip which can be used to replicate your data onto a new plastic card. Debit cards are particularly vulnerable, we recommend only using your debit card to withdraw cash from your ATM. Not for gas, not for groceries, and not at restaurants.

Consider An RFID Wallet

Man with empty wallet: Do RFID Wallets Work? Blocking 21st Century PickpocketingSkimmers aren’t just present at gas stations unfortunately. You card can be skimmed nearly anywhere, even from passers by on the sidewalk. RFID wallets can block skimmers and keep your cards protected.

And while the new EMV “chip” credit cards also provide a layer of protection, they contain a magnetic strip and can therefore still be skimmed.

Turn On Two-Step Authentication

This is an online security measure where a code is sent to you via a phone call or text. This code serves as a verification method upon login to ensure you are who you say you are and should have access to the account. It’s becoming more common to offer and encourage this extra layer of security. While it can be a bit annoying at times, the extra step can go a long way in keeping your personal data safe. You will want to start by adding two-factor authentication (2FA) to bank accounts, credit cards, email and other websites that have sensitive information (IRS, doctors office, stock trading, etc.). Then make a good habit to set it up whenever you create new online accounts in the future.

Two-Factor Authentication vs Multi Factor Authentication

Two-factor authentication uses your password/username combination as well as a second factor (usually something that only you have access to) to authenticate your identity. The most common form of this is a unique code sent to your cell phone, which you then enter as a secondary check to access your device or account.

Multi-factor authentication includes using your password/username combination, something you have access to and a factor unique to you. The most common form of this is a retina or fingerprint scan. Other factors can include location and time of day.1

It’s important to take advantage of 2FA and Multi-FA whenever you can because it can help prevent others from accessing your devices and accounts.

Can I Store My 2FA Codes Somewhere?

Yes, Google Authenticator is an app (with both Android and iOS versions) that will store your 2FA QR codes for free, however, it does not backup your codes (and only offers migration of codes to a new device for Google-specific logins), so if you migrate to a new device you may run into some troubles getting back into your services (we did). For this reason we recommend the Lastpass Authenticator, which does have a backup option. Lastpass can also save and store your logins.

Personal Experience

Our own team members Kimberly and Alex have some personal experience with password managers.

I like Dashlane (DL) more than LastPass (LP). I found LP not as user-friendly and would sometimes save multiple versions of a password. Therefore, when I’m logging in, I’m trying different options until one works. However, this has been resolved for the most part since I tested it and I have much fewer issues with this now. Dashlane I found to be much more user friendly. It offered better organization options from what I can recall. However, DL was more expensive than LP. I like LP’s free plan better than DL’s – with DL’s free plan you can only access the information on one device. – Kimberly

I only have experience with Lastpass and have found it an affordable, feature rich option to store passwords. Having Lastpass Authenticator to additionally store 2FA logins that are automatically backed up into the cloud (a feature I believe DL does not have) is a big plus. My gripes with LP include the inability to mass accept shared logins – I have to accept them one-by-one, which is tedious. Additionally, the LP interface has always struck me as slow and cumbersome. – Alex

Cybercrime Prevention For Students (And Their Parents)

Cybersecurity should start at a young age. Kids are using cell phones, playing video games, streaming music, paying for things with credit cards and engaging with smart technology at ever younger ages (and they are just as susceptible as their parents).

In fact, the National Cyber Security Alliance (NCSA) reports that kids ages 8-18 spend 7 hours and 38 minutes per day online. That’s nearly 1/3 of their day! This is why it’s vital for younger generations to stay informed and guarded against digital dangers.

  • Get them started on the right foot – Before unboxing or passing down a device to them, set it up with all the security settings and parental controls to ensure they aren’t opening up a can of worms when they power up.
  • Even the playing field for parents and kids – Share that the adults are following the same rules. This will make them feel they are not being punished or called out for having to adhere to special guidelines.
  • Think before you click – Similar to stranger danger warnings that are taught from a young age, the same applies to the internet. Don’t click on links that look suspicious, don’t open an email from someone you don’t know and don’t respond to texts from unknown numbers.
  • Make cybersecurity fun – Have them come up with something silly and equally safe for things like passwords (e.g. $illy$ally), screen names and usernames (e.g. Sk8boarding4fun) and use analogies so they can better relate to cybersecurity (e.g like spies trying to unlock a treasure chest). And once they’re ready and capable, introduce them to a higher level of security with a password service such as Lastpass.
  • Person in coffee shop on computer: Public Wifi Hackers? Keep Prying Eyes Off Your Files!Encourage them to learn – STEM (science, technology, engineering and math) skills help students think more analytically about computers and better understand the importance of digital security.
  • Beware of coffee shops, libraries and other public spaces – The coffee shop might have yummy Lattes, but their free Wifi can be an invitation for cybercrime. Using a public network can save you money, but it can be dangerous if you do not use precautions. Read our tips for using public WiFi, an easy reference guide for how to protect yourself next time you surf on a public network.
  • If it’s too good to be true, it probably is – Spammers are prone to targeting people who don’t know any better, especially children. So teach your kids not to click on shiny objects or fall for unbelievable deals.

Cybercrime Statistics

We’ve got an entire article now dedicated to ID theft statistics.

October Is Cybersecurity Awareness Month

Did you know that there’s an entire month dedicated to cybersecurity awareness? Yep! October is officially the month dedicated to bringing attention to this issue. Created by the National Cyber Security Division (NCSD) of the United States Department of Homeland Security and the NCSA back in 2004, National Cybersecurity Awareness Month (NCSAM) was set up to encourage protection among all internet users across the country. However, you shouldn’t just “celebrate” one month out of the year. Practice these tips year-round!

Watch this quick three-minute video from former President Obama as he explains how the growth of digital networks has increased the need to invest in online security and the steps you can take to protect yourself from online threats.

Prevent ID Theft

Man on computer in the dark: What is the Best Identity Theft Protection?Hackers are working hard behind the scenes to steal your identity for their personal gain via identity theft. Learn more about ID theft, how it happens and how you can stay out of harm’s way in our all-encompassing identity theft guide.

Unfortunately, nearly everything is a cybersecurity threat today. Whether it involves connecting to Wifi or sharing your data to the cloud, you’re in danger. The important thing is to remember to always be as safe as possible when using your connected devices. Or just take a break from technology, go for a walk and grab some fresh air!

Have you or anyone you know had a cybercrime scare?

Sources: [1] McAfee [2] SBA

About The Author:

Sadie has a bachelor’s in communications and minor in business from the University of Texas at Austin. She has been writing about, researching and a user of security and smart home technology since 2012. As an early adapter and avid user of gadgets, she’s not only well-versed in how to use them but also passionate about helping others integrate them into their lives and homes.

Having lived in various urban neighborhoods in major cities like Dallas, Austin, Winston-Salem and currently Washington DC, Sadie has experienced her share of property crimes over the years; from car break-ins to stolen bikes. As a result, she’s extra cautious when it comes to protecting herself and her property.

Sadie attends conferences, events and webinars to stay up-to-date on cybersecurity and technology. She loves traveling the world and is a self-proclaimed Apple junkie.

Disclaimer: This website contains reviews, opinions and information regarding products and services manufactured or provided by third parties. We are not responsible in any way for such products and services, and nothing contained here should be construed as a guarantee of the functionality, utility, safety or reliability of any product or services reviewed or discussed. Please follow the directions provided by the manufacturer or service provider when using any product or service reviewed or discussed on this website.

2
Leave a Reply

avatar
newest oldest most voted
Anonymous
My credit card get compromised all the time (sadly) but our debit card was recently hacked into and it was because of the gas station (the only thing we use that card for). They trained our entire checking account! Luckily the bank reimbursed us the next day but still pretty scary!
Brooks J
I’m doing a research paper for my 6th grade class this semester and will site this as a reference as this article has been very useful.