How to Keep Your Personal Information Secure and Avoid Fraud and Identity Theft
I received an email from a client stating that he was tied up in a meeting and needed “help” urgently. Instantly I thought this was odd for several reasons:
- Stating needing urgent help
- Stating being unreachable (wasn’t sure what meeting since he was retired)
- The client usually signed his emails with his initials and this time his entire name was spelled out
You may feel obligated to help, but I would rather get yelled at for not doing anything than send a client’s money to Nigeria. The email was also not specific as to what he wanted “help” with so it seemed to be more of a test to see if I would be a good target.
I called him to confirm and he said he was hanging out with his grandkid and not in a meeting and he did not write that email! I told him to change his password on his email account right away and delete any important documents he might have stored in his email account.
Regardless of this tactic, we don’t move money without first verbally confirming with a client and have systems in place to make sure this does not happen. Once the money is moved it is gone forever (especially with wires) to a bank account halfway across the world faster than you can take a breath.
How to protect yourself
Passwords – passwords should have special characters, upper-case and lower-case letters – they can be easy enough to remember so you don’t have to write them down but not easy to figure out. Criminals have software that can easily figure out weak passwords. Try not to use the same password on several sites – if one account is compromised attackers may be able to gain access easier to your other accounts. You could use a sentence that you can remember with letters and numbers on either side or in between. Never give your password to anyone.
Security questions – avoid using personal information or information a criminal can easily figure out such as your mother’s maiden name, address, dates, or colleges attended. You can also use two-factor authentication – this is the system that sends a code to your phone which you have to enter before you can gain access to your account. It requires your username and password plus a security question and/or access code.
Protect Sensitive Info – avoid storing documents with sensitive info in your email (yahoo, google, etc) Secure personal information on the web to the extent possible – for example don’t publicly post your address on social media accounts or phone numbers, etc. Although a lot of this personal information is readily available online anyway, why make yourself an easier target? Sign out of social media websites when you are not using them and ensure that your settings and posts are private and can only be seen by your contacts.
Question Everything – Always verbally confirm messages or email requests and never respond to a link embedded in an email. If you get an email asking you to click on a link, go straight to the website directly. Some emails can impersonate real websites but they are actually fraudulent – for example an email saying you have a secure message and to “click on the link”. You can try and hover over the email address or click on it to see where the email is really coming from – if it does not look legitimate delete the email. For example, you may get an email from Amazon which may legitimately be [email protected] but when you click, reply or forward the email address you may see an address like [email protected] which is obviously not Amazon. Don’t click on texts with links unless you know where they are coming from.
If your credit card company calls you and asks for personal information tell them you will call them back on the number on the back of your card.
Encrypt your Data – Keep your browser secure by using encryption software that scrambles information you send over the internet. Before sending personal information you should look for a lock icon on your internet browser which indicates your information will be safe when it’s transmitted. When connecting to a website that uses your personal information make sure you are using an encrypted connection – the URL should say HTTPS.
Wifi Access – Avoid connecting to unsecured public wireless networks such as in coffee shops, hotels, airports, restaurants, etc. if there is no password. Don’t allow public computers to remember your passwords – if you have to log in to a public computer to access your account make sure you log out and close the browser when you are finished.
What to do if you are hacked
Email – Change your password immediately if your email has been hacked. You may also want to warn your contacts in the event they get an email from you asking for information. Make sure the hackers didn’t set up a forwarding service to receive your emails.
Bank accounts & credit cards – Contact the institution immediately since catching this earlier will prevent additional transactions from taking place. The bank or credit card company can stop transactions once they are notified that there could be a fraud. Check your credit report to make sure no accounts have been opened in your name. You can also put a fraud alert on your credit or freeze your credit. This is a useful website where you can get your free credit report for the three different reporting agencies.
Avoid using a debit card for everyday purchases and only to get cash – if your debit card is stolen it is harder to get back that cash compared to a stolen credit card.
Run Antivirus or malware Software on your computer – Webroot, Norton, and McAfee are some popular antivirus software. Also, be diligent about running software updates even on your cellphone as sometimes these updates include enhanced security features.
Social media – If your social media accounts suddenly have posts you didn’t make you have probably been hacked – change your password immediately and visit the applications page and remove any apps you did not add.
Of course, none of these suggestions are foolproof as hackers are getting more and more sophisticated by the day, but anything that looks strange probably is. Better to stop, think and ask questions rather than end up with compromised data or becoming a victim of fraud.
Categories
Recent Insights
-
Rebuilding Financial Confidence After Divorce: Managing Risk & Moving Forward
Divorce is not just an emotional transition—it’s a financial one, too. The process of separating assets, redefining financial goals, and adjusting to a new financial reality can feel overwhelming. But with the right mindset and strategies, you can regain control and build a future that aligns with your new chapter in life. Understanding Financial Risk…
-
Giving with Pride: Smart Strategies for LGBTQIA+ Donors
Understanding the Landscape of LGBTQIA+ Philanthropy LGBTQIA+ donors are uniquely positioned to drive meaningful change, but the philanthropic landscape remains complex and underfunded. Historically, LGBTQIA+ organizations have faced significant challenges in securing resources, often competing with larger, more established nonprofits for limited funding. This disparity highlights the importance of strategic giving to ensure that your…
-
How to Build Lasting Relationships that Propel Your Business and Elevate Your Community
As business leaders, our role in the community extends beyond charitable acts—it’s a strategic initiative that strengthens both our businesses and the communities we serve. Building meaningful community partnerships is not just about doing good; it’s about doing it strategically to foster deeper relationships, enhance your brand, and make a lasting difference. But where do…
-
Talk Your Chart | From Tax Trends to Firing a God Portfolio: Economic Insights | Episode 68
In Episode 68 of Talk Your Chart, Marcos and Brett dive into a jam-packed discussion of economic trends, market psychology, and long-term investing. From tax receipts and Social Security’s ticking clock to why even a ‘God’ portfolio gets fired—this one covers it all and more. Charts available for download here.
-
The Other Behavioral Gap: Why Total Return Investing Could Be the Key to Your Financial Freedom
What is the Other Behavioral Gap: If you’ve been investing for a while, you’re likely familiar with the first major behavioral gap: emotional investing that is driven by fear or greed. These forces drive you to buy high and sell low. It’s a pattern that often shows up when market fluctuations cause knee-jerk reactions. But…