Personal Cybersecurity in 2022: What You Need to Know

Cybercrime is growing at an alarming rate with almost 850,000 reports to the FBI in 2021 alone.¹ 

Those are just the ones reported! Imagine how many more go unreported.

October may be Cybersecurity Awareness Month, but personal cybersecurity should always be at the forefront of our minds.

The problem is that the number of incidents are so overwhelming that it feels as if personal cybersecurity is impossible.

Just consider these scary statistics from Private Internet Access²:

  • Personal computers and devices experience a hacking attempt every 39 seconds (or more than 2,200 times in one day).
  • The FBI received 241,000 phishing-related complaints in 2020.
  • 45,000 personal data breaches were reported in 2020.
  • 37 billion records were exposed in data breaches in 2020.

If your personal information can be stolen in a large company data breach, how can what you do at home matter?

The truth is that cybercrimes can happen anywhere – and to anyone. And it’s up to us to take every step possible to protect ourselves from identity theft, fraud, and other types of cybercrimes.

The Basics of Personal Cybersecurity

personal cybersecurity

Cybersecurity is the protection of devices, networks, and computer systems from digital attacks. 

Personal cybersecurity refers to the best practices for protecting one’s privacy, data, and devices from cybercrimes and unauthorized access (such as hackers). 

If someone gains access to a network or a device (aka hacking), they can steal your personal information.

Why Personal Cybersecurity Is a Major Concern

personal cybersecurity

Unlike many crimes in the physical world, cybercrimes are often difficult to wrap our heads around because we don’t see them. 

Hackers stay hidden behind computer screens, and, many times, the cybercrimes go unnoticed until the damage is done.

The problem is that many of us keep a significant amount of personal information online or on our devices, such as passwords, account numbers, social security numbers, addresses, and so on.

If a hacker gains access to personal details such as your banking information or credit card login, they could take that information and sell it on the dark web.

According to Norton, “Almost 10 million people have their identity stolen each year,” making personal cybersecurity paramount.³

What Hackers Want

personal cybersecurity

You may be wondering why a hacker would target you.

The answer is simple: personal information.

Your personal information, no matter who you are, is valuable.

On the dark web, someone can purchase a social security number in a matter of minutes. They may use this to create an entirely new identity, collect tax refunds, or open a new line of credit.

According to Private Internet Security, “As many as 15 billion user credentials (1 billion of them unique) from 100,000 breaches are still up for grabs. The offered data includes account usernames, passwords, online banking details, and social media accounts.”⁴

How Cybercriminals Come after Individuals

personal cybersecurity

When we hear about cybercrimes in the news, it is usually large-scale ransomware attacks on major businesses, such as the Colonial Pipeline.

However, cybercrimes happen to individuals every day in the United States.

How many times have you been sent a friend request on Facebook by someone you are already friends with or received a message with a suspicious link to click? These are all types of personal cybercrimes.

Let’s look at some of the ways cybercriminals go after individuals.

  • Phishing: Communication technique that attempts to convince users to provide sensitive personal information or click on dangerous links. Today, cybercriminals also use phishing through SMS messages (smishing) and through phone calls (voice phishing or vishing). This is the most common type of complaint the FBI receives regarding personal cybersecurity and the top breach method.

  • Malware: Software that performs a cyberattack on an individual, such as clicking a link that downloads malicious malware to your device.

  • Data Breaches: Data breaches affect large companies and the individuals who have shared personal information with those companies. According to Embroker, “One major example of a third-party breach occurred at the beginning of 2021 when hackers leaked personal data from over 214 million Facebook, Instagram, and LinkedIn accounts.”⁵

  • Smart Devices: More and more Americans are enjoying the conveniences of smart devices; however, the more internet-connected devices you own, the more your personal cybersecurity is at risk. Embroker reports, “Attacks on smart or ‘Internet of Things (IoT)’ devices spiked as a result, with over 1.5 billion breaches occurring between January and June of 2021.”⁶ 

What to Do after a Data Breach

personal cybersecurity

Have you received a generic email from a company, such as LinkedIn, which informs you that your information was part of a data breach? What are you supposed to do with that information?

First, read the email from the company and pay close attention to when the breach occurred.

Take note of what type of information was part of the stolen data. This may include login credentials, financial information, Social Security numbers, or addresses. 

Even if login credentials weren’t stolen, change your passwords. If you reuse your password on multiple sites, this means hackers can find out what other sites you use the password for and gain access there, too.

If the data breach includes financial information, contact your financial institutions right away. Let them know there is possible fraud, and they will walk you through the next steps.

Request a free credit report from AnnualCreditReport.com to see if any new accounts have been opened in your name. 

You may want to consider taking a preventative measure by placing a freeze on your credit to block anyone from opening an account. 

Delete any unused old accounts – especially those that used the same password.

What to Do If You Suspect You’ve Been Hacked

personal cybersecurity

There may be times when you suspect you may have been hacked or a victim of a cybercrime, but you aren’t 100% sure. 

Start by heading over to Have I Been Pwned? and entering your email address. This website catalogs data breaches and the information about each breach. 

You’ll find out right away if your information is “out there.”

You can also look for signs that you have been hacked, such as posts appearing on your social media that you did not post or messages in your Sent folder that you did not send. 

If you suddenly cannot sign into your email account or social media account, this is another sign you’ve been hacked.

Personal Cybersecurity Basics

personal cybersecurity

  1. Create strong passwords. The very first step toward personal cybersecurity is creating strong passwords. You cannot use a password like 12345. The more complicated your passwords, the harder it will be for hackers to gain access.

  2. Use multi-factor authentication. Multi-factor authentication provides an extra level of security on your accounts. It is wise to use multi-factor authentication for any account that has personal information, including social media.

  3. Sign up for security alerts. Sign up for security alerts with your bank and credit card company. In addition, monitor your credit reports and banking statements for any unauthorized transactions. Pay attention to Google’s password manager. If you receive an alert that your password has been compromised, it’s time to change it.

  4. Don’t autosave personal information. No matter how convenient it is to autosave your credit card information for online shopping, it is not worth the risk. Take the time to reenter the information each time you make a purchase on a safe and secure online website.

  5. Invest in cybersecurity tools. Antivirus solutions, malware, and firewalls help reduce cybersecurity risks on your devices.

  6. Run system updates. Whenever you receive a notification that it is time to run a system update, do it – even if it is at an inconvenient time. These security updates protect against the latest cybersecurity threats.

  7. Think before you click. Before you visit any site or click on any link, think carefully. Use what you’ve learned about phishing and apply it.

  8. Recognize and report phishing. Does the email or text message try to mimic a real bank or company? Does it ask you to send some sort of personal information, such as a password, to secure your account? Does it offer something too good to be true? Are there spelling or grammar errors? You can easily find out if it is real or a phishing attempt by contacting the actual company (e.g., your bank, credit card company, or Netflix) directly rather than clicking the link or replying. 

We regularly post videos with financial information and updates. Check us out on YouTube.

Watch Videos

Sources

  1. https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
  2. https://www.privateinternetaccess.com/blog/hacking-the-world-part-1-hacking-basics/
  3. https://us.norton.com/internetsecurity-privacy-personal-cybersecurity.html#
  4. https://www.privateinternetaccess.com/blog/hacking-the-world-part-1-hacking-basics/
  5. https://www.embroker.com/blog/top-10-cybersecurity-threats-2022/
  6. https://www.embroker.com/blog/top-10-cybersecurity-threats-2022/

 

0 0 votes
Article Rating

401(k) Maneuver™ is offered by Royal Fund Management, LLC, which is registered as an investment adviser with the SEC and only transacts business in states where it is properly registered, or is excluded or exempted from registration requirements. SEC registration does not constitute an endorsement of the firm by the Commission nor does it indicate that the adviser has attained a particular level of skill or ability. Royal Fund Management, LLC, is not affiliated with or endorsed by NASDAQ.

All investment strategies have the potential for profit or loss. Changes in investment strategies, contributions or withdrawals, and economic conditions may materially alter the performance of your portfolio. Different types of investments involve varying degrees of risk, and there can be no assurance that any specific investment or strategy will be suitable or profitable for a client's investment portfolio. There are no assurances that a client’s portfolio will match or outperform any particular benchmark. Asset allocation and diversification do not ensure or guarantee better performance and cannot eliminate the risk of investment losses. Projections are based on assumptions that may not come to pass.

Images and photographs are included for the sole purpose of visually enhancing the website. None of them are photographs of current or former clients. They should not be construed as an endorsement or testimonial from any of the persons in the photograph.

All third-party trademarks, including logos and icons, referenced in this website and our content, are the property of their respective owners. Unless otherwise indicated, the use of third-party trademarks herein does not imply or indicate any relationship, sponsorship, or endorsement between 401(k) Maneuver and the owners of those trademarks. Any reference inside this website or content to third-party trademarks is to identify the corresponding third-party goods and/or services.

0
Would love your thoughts, please comment.x
()
x

Select a Date from the Calendar below

UPDATE YOUR 401(k) ACCOUNT

Select a Date from the Calendar below

UPDATE YOUR 401(k) ACCOUNT

Have questions? Need help?

Book Your Complimentary

15-Minute 401(k) Strategy Session


logo

Looking for tips that might maximize your retirement
savings and help you be a better steward of your money?

Subscribe to our 401(k) Blog

The go-to-source for your retirement investing and saving tips

5 401(k) Accounts Mistakes that May Negatively Affect Retirement Income

Download Your Copy Today

*Your privacy is important to us. We do not rent, sell or share your information.


Why Account Balancing & Allocation May Affect 401(k) Performance

Download Your Copy Today


*Your privacy is important to us. We do not rent, sell or share your information.


The 5 Top Costly 401(k) Rollover Pitfalls

Download Your Copy Today

*Your privacy is important to us. We do not rent, sell or share your information.

Make the Best Decision for Retirement:
Understanding the Different Types of
Financial Advisor Licenses

Download Your Copy Today

*Your privacy is important to us. We do not rent, sell or share your information.


How Popular Advice On Target Date Funds May Be
Working To Undermine Your 401(k) Retirement Savings

Download Your Copy Today

*Your privacy is important to us. We do not rent, sell or share your information.


3 Things That May Supercharge Your Future
401K Performance...Even In a Down Economy

Download Your Copy Today

*Your privacy is important to us. We do not rent, sell or share your information.