Cybersecurity: Protecting your internet-connected systems

 In Blog



s most all of us increasingly use technology in our daily lives, cybersecurity, the protection of electronic data, either business or personal, has become ever more critical. The technology industry is pulling digital infrastructure along in a manner that is constantly changing, and consumers are often left wondering “what’s coming next?” Much of this change is made with the best of intentions such as the advancement in cloud-based technology and intellectual property (IP). But like many areas of progress, there are stumbling blocks to clear. Now, more than ever, hackers are finding new and creative ways to infiltrate digital platforms, steal data and IP. As a firm, Vahanian & Associates consults and utilizes the services of various cybersecurity experts and we would like to share with you some of the input we have seen authorities in the field provide.

  • Passwords and Online Account Access:
    • Change your passwords regularly and use a different password for every account and website.
    • Maintain strong passwords with a combination of lower- and upper-case letters, numbers and symbols, or even a random phrase or sentence where possible.
    • Utilize additional security questions.
    • Add two-factor authentication such as a pin number.
    • Enable thumbprint activation for mobile applications.
  • Wi-Fi:
    • Limit the number of public Wi-Fi connections as cyberattacks can be initiated through a link or unsafe internet connection like public Wi-Fi.
  • Security:
    • Utilize a firewall.
    • Install antivirus software and maintain the latest version.
    • Utilize an identity theft protection service such as LifeLock.
    • Disable your FaceTime function or camera when it is not in use.
  • Scams & Hacking Attempts:
    • Do not open suspicious emails or texts that could be phishing scams. Many such scams include a request for bitcoin or cryptocurrency, and provide a deadline for payment. If you do not know the person or don’t know where the email/link in the email will take you, it is better to avoid opening or clicking the link.
    • Do not provide any personal information via email or phone unless it is through a secure network such as a secure message system. Such information includes your bank account information, check images, social security numbers, etc.
    • Be cautious when downloading external apps. Hackers often use apps as a way to drop malware designed to steal personal information. As a precaution, make sure you are downloading a reputable app – read comments and user reviews.

Additionally, if there is a corporate security breach, quite often, such companies will provide resources to see if you have been affected. In many cases, the company that was hacked will even provide affected customers with a free credit monitoring or identity theft protection service for a period of time.

While there is no silver bullet to completely insulate yourself from security threats, there are certainly ways that you can try to make it harder for someone to access data. This is a new reality of today’s society, so hopefully, we will continue to see protective technology make advancements while simultaneously making security and privacy of utmost importance.

This overview is intended to get you thinking about some steps you might take to protect your own information. For all of us, it is a work in progress and we encourage you, based upon your situations, to seek professional guidance applicable to the technologies you use in your daily lives.

Vahanian & Associates (“Vahanian”) created this presentation for its website. Any other distribution of this presentation is strictly prohibited. While the content presented is believed to be factual and up to date, it is based on information obtained from a variety of sources. Vahanian believes this information is reliable, however, it has not necessarily been independently verified. Vahanian does not guarantee the complete accuracy of all data in this blog post, and it should not be regarded as a complete analysis of the subjects discussed. All expressions of opinion reflect the judgment of Vahanian as of the date of publication and are subject to change. This blog post does not constitute personalized advice from Vahanian or its affiliated investment professionals, or a solicitation to execute specific securities transactions. Vahanian is not a law firm and does not intend for any content to be construed as legal advice. Readers should not use any of this content as the sole basis for any investment, financial planning, tax, legal or other decisions. Rather, Vahanian recommends that readers consult Vahanian and their other professional advisers (including their lawyers and accountants) and consider independent due diligence before implementing any of the options directly or indirectly referenced in this blog post.

Past performance does not guarantee future results. All investment strategies have the potential for profit or loss, and different investments and types of investments involve varying degrees of risk. There can be no assurance that the future performance of any specific investment or investment strategy, including those undertaken or recommended by Vahanian, will be profitable or equal any historical performance level. Any index performance data directly or indirectly referenced in this blog post is based on data from the respective copyright holders, trademark holders, or publication/distribution right owners of each index. The indexes do not reflect the deduction of transaction fees, custodial charges, or management fees, which would decrease historical performance results. Indexes are unmanaged, and investors cannot invest directly in an index.