Cybersecurity: Simple Steps You Can Take to Help You Stay Protected

Share this article

What we’ll cover:

  • Cybersecurity is essentially the practice of protecting your information from unauthorized access and/or criminal use on the internet, as well as ensuring confidentiality, integrity, and availability of that information.
  • Never share your personal information when responding to any unsolicited phone calls, emails, or text messages.
  • Creating a strong password, installing a firewall, and keeping your software up to date are just some of the ways you could protect yourself.

We can do nearly everything online these days: order groceries, pay bills, and even invest in the stock market. All of that convenience and buying power at our fingertips makes it easy to get things done, but using personal data online (like credit card numbers) also means it’s a good idea to educate ourselves on how to protect our information. That’s where cybersecurity comes in. 

At a basic level, cybersecurity is about making sure your personal data doesn’t get in the wrong hands. But it also includes other practices like keeping companies’ intellectual property protected, helping track down hackers, detecting leaks, and a lot more.

In this article, we'll go over the basics of cybersecurity and share a few steps you can take to help protect your information online.

Cybersecurity: What is it?

Cybersecurity is essentially the practice of protecting your information from unauthorized access and/or criminal use on the internet, as well as ensuring confidentiality, integrity, and availability of that information.

Have you ever gotten a computer virus or clicked on a pop-up that then crashed your computer? Following cybersecurity best practices can help protect you from these types of malware. But cybersecurity also deals with other serious issues like having sensitive information stolen or even crimes being committed using your personal network.

No one wants to find themselves in any of these situations, and while there’s no guaranteed way to avoid these risks altogether, there are things you can do to help mitigate some of the risks. Here are eight helpful tips to consider.

1. Don’t share your personal data with anyone/any website you’re not familiar with

This one may be obvious, but we’re going to say it anyway: Never share your personal information when responding to any unsolicited phone calls, emails, or text messages.

stipple_divider

Be on the lookout for unsolicited calls, emails, and direct messages asking for your personal information.

stipple_divider

Some helpful tips for figuring out if an email or text message is reputable or not includes looking closely for any obvious typos or grammatical errors. You can also look up the company or individual’s name to see if it comes up as reputable or not.

In the case of a phone call, if you’re not sure about the identity of the caller, you can always end the call and then call the actual company directly to verify the information. You can also ask the caller for specific details, such as a call back number or supervisor's name. In any situation, do not give any personal information out if you’re not positive it’s a legitimate source.

2. Use strong password protection 

One of the easiest ways to protect yourself is to have a strong password. Simple passwords, like Password1234 or one that includes personal info like your name or name of your children, can make gaining access to your computer and data easy.

Use complex passwords with a mix of uppercase and lowercase letters, as well as numbers and symbols. You could also consider using a passphrase, which can be a series of random words or a sentence. Passphrases can be easier to remember and are generally longer than a normal password for added security.

It’s also a good idea to vary passwords across different websites and profiles and change them frequently.

Don't Forget

Use complex passwords with a mix of uppercase and lowercase letters, as well as numbers and symbols.

3. Use multi-factor authentication (MFA)

MFA goes along with protecting yourself from the password stage and can be a helpful additional step to verify your identity. Not all apps and software have the option for MFA, but if yours do, it’s worth using. MFA works by using at least two different components to verify someone’s identity and grant access during login. Think of it as an additional layer of security.

  • There’s a chance you already have experience with MFA. Do any of your logins require you to enter a password as a first step, and as a second step, you receive an email/text message/notification asking you to verify that you are the person attempting to log in? If so, that’s MFA. You also might be asked to download an app that then sends you a push notification every time you log in and you have to accept the push in order to gain access.
  • MFA is important because even if a hacker or phisher is attempting to gain access to your personal information, they can’t do so without the next factor authentication. And with MFA, you’ll likely be notified almost immediately if someone else is trying to log in to your account(s).

4. Avoid pop-ups, unfamiliar links, and emails from unknown senders 

Phishers masquerade as trustworthy sources in order to convince someone to hand over sensitive information. Phishing scams often use text messages, emails, and even phone calls to pose as a reputable source and ask for your Social Security number, account numbers, and passwords. They can then access your bank accounts, email, and other sensitive information.

Common messages you might receive from a phisher include emails or texts saying there’s been suspicious activity on one of your accounts and asking you to verify your account info. They may also send you links to make payments, say you’re eligible for a government refund, or even offer promotions for free things.

  • A smart and easy way to protect yourself against phishers is to simply never enter any of your personal information in any window, pop-up box, or email that you have not opened or initiated yourself.
  • If you ever receive suspicious emails you don’t recognize, immediately delete them or send them to spam. Don’t open or click on them to further investigate.
  • If something suspicious is sent to your work email, you can try contacting your IT department. They may be able to see where the email originated and if it’s a reputable source or not.

5. Keep your software up to date

Keeping your software up to date is one of the easiest ways to protect yourself against hacking. Software updates or patches often address security vulnerabilities, so it's a good idea to enable these automatic updates if available.

It’s also worth mentioning that if you don’t already utilize anti-virus software, that can be a helpful layer of protection as well. Anti-virus software works to prevent and remove malware on your computer. However, anti-virus software isn’t a Band-Aid for all cybersecurity risks and should be viewed as an additional step to protect your information rather than a cure-all.

Content to keep you on the path to financial well-being.

6. Install a firewall

There are two types of firewalls: hardware and software. 

Firewall software is typically included with most operating systems, so you just need to enable it. It’s also available from software vendors and internet service providers, but if you download it yourself, be sure you’re getting it from a reputable source on a secure site.

  • Pros: You may be able to control the internet websites that your computer is allowed to send and receive information from (so basically, you can get specific about where information can and can’t be accessed).
  • Cons: Typically located on the same system that is being protected, so if the system does get hacked it’s possible for the software to be disabled as well.

Hardware-based firewalls are a physical device positioned between your computer and the internet. Some internet service providers may include a hardware-based firewall with your router.

  • Pros: Provide additional line of defense against attacks on desktop-computing systems.
  • Cons: A separate device that requires a trained professional to support it (in terms of the initial installation and any maintenance).

Whether you choose to use a firewall software or a hardware-based firewall is up to you, the important thing is to have one installed.

7. Be wary when using public Wi-Fi networks

As convenient as it is to use free Wi-Fi at coffee shops, hotels, airports and so on, they’re not always the most secure connections. There’s a chance that when you connect to a public Wi-Fi network and send information through a website or app, that info could be accessed by someone else who’s also connected to the network.

If you’re using a public network, it might be a good idea to avoid using any apps that require your personal or financial information. Stick to visiting those when you’re at home or using a private network you know is secure.

8. Keep your own Wi-Fi network secure

There’s more to protecting your home Wi-Fi network than just keeping your neighbors from getting free internet. Just like using a public network can put your information at risk, people who have access to your home network may potentially have access to your information, too. Not only could they dig up your passwords and other sensitive information, but if someone gains access and uses your network to commit a crime , it can be traced back to your network and address.

To protect your home network, change your router name from the default to something only you know. Also be sure to change your router’s pre-set password and use long, complex passwords with a mix of upper and lowercase letters as well as numbers and symbols. 

Final tips to keep in mind

  • Never share any personal information with a person, website, email address, or app that you are not familiar with and that you have not sought out yourself.
  • If you ever receive a text or email from the IRS asking for your information, it's likely a scam. According to the IRS website, the IRS does not initiate contact by email, text messages, or social media channels requesting personal or financial information. If you receive a suspicious email from the IRS requesting personal or financial information, do not respond to it. Do not click on any links or attachements, and immediately delete the email. Forward the email or link to [email protected].
  • Certain correspondence claiming to be from the FDIC can be fraudulent as well. The FDIC does not send unsolicited correspondence of any kind requesting personal information or asking for money. If you receive any correspondence claiming to be the FDIC requesting information like your bank account info, credit card or debit card numbers, your Social Security number, or any passwords, do not respond. Visit the FDIC webpage to learn more.

Did You Know?

If you’re concerned about identity theft, you can always freeze your credit. That way, even if someone does gain access to your sensitive information, it will be difficult to open accounts in your name. To freeze your credit, call each of the major credit-reporting bureaus Experian, TransUnion and Equifax.

How Marcus Protects Your Information

At Marcus, we make it a priority to protect your privacy and safeguard your account information. We take the security of your personal information seriously and work to limit access to your personal information to authorized employees, agents, contractors or vendors. We also maintain physical, electronic and procedural safeguards designed to protect the information against loss, misuse, damage or modification and unauthorized access or disclosure while in our possession.

This article is for informational purposes only and is not a substitute for individualized professional advice. Articles on this website were commissioned and approved by Marcus by Goldman Sachs®, but may not reflect the institutional opinions of The Goldman Sachs Group, Inc., Goldman Sachs Bank USA, Goldman Sachs & Co. LLC or any of their affiliates, subsidiaries or divisions. Information and opinions expressed in this article are as of the date of this material only and subject to change without notice.