Category: Internet Security

How to Protect My Family’s Finances from Hackers

Protect My Family’s Finances from Hackers

With the rise of technology, online security is more important than ever. Hackers are always developing new ways of compromising banking accounts. You do not want to be a victim of these cybercriminals, and most especially, you do not want your loved ones to fall in the trap. Thus,are there ways to make sure yours and your family’s finances are safe online?

There are many things you can do to protect your family from hackers. You can install the best antivirus, use a VPN to hide your IP, create strong passwords, and avoid clicking on bad links, etc. Read the entire guide to learn more.

Install the Best Antivirus

One of the effective ways of protecting your finances online is by installing good antimalware. A good antivirus will protect you from all malware created by hackers such as Trojans, Viruses, ransomware, adware, spyware, to name just a few.

The best antivirus comes with extra features to keep your online accounts safe from scams and other cybercriminals. Here are the features to look out for when buying one;

  • Malware protection; a good antivirus program should offer protection against new and advanced forms of malware. Cybercriminals use this malware to steal your banking details such as passwords and usernames.

This protection will improve your device’s native security system. When your devices and online accounts are protected, it will be less likely that your credit card numbers will be exposed to hackers.

  • Ransomware protection; ransomware is a type of malware that encrypts a victim’s files. The best antivirus will prevent your data from being held ransom.
  • Phishing protection; it is so easy to click on a link that disguises as your bank. A good anti malware will warn you when you are about to enter into a fake site.

On a fake website, hackers entice you into entering sensitive information such as credit card details, email addresses and passwords. Hackers use this information to steal your money. With a good antivirus, hackers will not be able to steal this data.

You will also be warned if you receive fraudulent emails that look as if they are from a friend, a company or financial institutions.

Parental control features; since many kids are spending more time online, they need an antivirus that can keep them safe from predators, addictive apps, and hackers.  A good antimalware program has parental control features that can filter out offensive content, block tracking apps and give the exact location of your kids for proper monitoring.

Use a VPN to hide your IP address

Get a good VPN. It will increase your security on private and public internet connections making it hard for cybercriminals to steal your financial information.

With a VPN, your details, like your location revealed by your IP address, are hidden, so you can securely access websites, apps, entertainment and more. It offers online privacy. Your internet provider, tracking website and internet browsers cannot be able to tell what you are doing online or able to disclose your sensitive information.

With this program, you can share any file without worrying a hacker might know its content.

Use 2-Factor Authentication to Protect your Financial Accounts

One of the best ways of protecting your family from hackers is by using 2-factor authentication to secure their online accounts.  Usernames and passwords are no longer sufficient since hackers can guess them.

With multi-factor authentication or 2-factor authentication, you will be required to verify your identity either by use of a call, text, or a code being sent to your phone number.  This provides an extra layer of security to your online accounts.

This technology can use your fingerprint, voice, and facial recognition so as to verify your identity.  Many banking institutions are using this technology since it best secures your information online.

Create strong passwords

If you want your family to stay safe online, encourage them to create strong passwords for their online accounts. Strong passwords are hard to crack.  A strong password that can beat hackers has the following characteristics;

  • Has 15 characters or even more
  • Has a mix of numbers, letters, and characters. Don’t forget to include too uppercase and lowercase letters
  • Avoid easy passwords such as 123, admin
  • Avoid using your names, phone numbers and your birth date as your password. Do not use passwords that you have used before or use for your other online accounts.

Remember, the best passwords will thwart brute force and make your accounts hard to break.

Educating Kids

The more your kids know about online safety the better they will be equipped to deal doing their part.  They will more easily understand the dangers of financial hacking when they first respect the value of money.  You can also start simply by teaching kids how to use online finances responsibly.

Share This Article

How to Report an Email as Phishing

Report Email Phishing

Hopefully when you received a phishing email regarding one of your online accounts you didn’t click the link and try to login. This is how hackers attempt to gain access to your account without you knowing. If you did login, immediately close your browser. Then, re-open it and go to the proper sign page through your browser and change your password.

We all get phishing attempts via email but we can do more than just educate ourselves on how to prevent being tricked. Before you delete the phishing email report it to the proper website that the phishing email is trying to access. These same companies have cyber security people that you can forward the email to.  Simultaneously you can report all phishing attempts to the Anti-Phishing Working Group at [email protected]

When concerned about possible virus infection of your computer perform a malware scan. To clarify, most phishing attempts are not created to infect and take over your computer.  Rather, the goal of phishing is to learn your account login details so they can steal your personal information.

Below are some of the more common companies that identity thieves try to mimic. These are just examples and there are many others.  If you don’t see the contact information below for the company you are looking for, simply Google it safely at the top of our website. For example, if the phishing attempt is in regards to PayPal, Google “Report PayPal Phishing”.  Often, you will find an email address posted that you can forward the phishing email to.

Report as Phishing to These Companies

In addition to forwarding phishing emails to appropriate companies and to the Anti-Phishing Working Group, you can also report the phishing link to Google but be careful. Don’t open the link in a browser, simple right click the link and select copy hyperlink. Cut and paste that link into the Google submission form and submit. Then, delete the phishing email. 

Here are a few examples of the top companies whose account holders are the top targets.  These companies want you to forward phishing emails to them so they can prevent future fishing attacks.

PayPal

PayPal is a top target of phishing because it gives thieves direct access to your money. If if you don’t currently have funds in your PayPal account, people with access can make payments out of a bank account or credit card that you have linked to. Report PayPal phishing attempts to [email protected] which can also be accessed on their PayPal suspicious activity.

If you have clicked a bad link or are worried about whether your account has been compromised change your password immediately. Learn more about how PayPal deals with account fraud.

DocuSign

Often, phishing links for DocuSign will go to Google Docs.  This may appear legitimate because it is using the Google domain but really it is someone with a Google account hosting a bad doc to gain your personal information.  Be proactive and report suspicious emails to DocuSign’s security team at [email protected]. If you feel the security of your account is at risk, contact DocuSign customer support.

Below are some tips to help spot the difference between real and spoof DocuSign emails: 

All URLs to view or sign DocuSign documents will contain “docusign.net/” and will always start with https.  All legitimate DocuSign envelopes include a unique security code at the bottom of notification emails. If you do not see this code, don’t click on any links or open any attachments within the email.

For the latest DocuSign security and system performance information, visit the DocuSign Trust Center

Report Facebook Phishing

Facebook is one of the largest website in the world with over 2.7 billion active users.  They have taken great strides to protect against phishing and promote that they take seriously all phishing reports when you forward the email to [email protected].   They have also set up security tools to prevent outsiders from signing into your account.  Like many online accounts they recommend and offer ‘two factor authentication’.  They will also email you of suspicious login attempts when you set up to receive unrecognized login notifications.

Netflix

Because Netflix is such a popular streaming service these days, it’s one of the more popular targets for phishing. Netflix states that they will never ask you to click a link to enter personal information about your account. Even if you are not sure the email you receive is a phishing attempt, report it to Netflix by forwarding the email to [email protected]. If you want to check your account to see if something is wrong with your billing, for example, go to Netflix.com directly or via a bookmark you’ve already saved to log into your account.

Here is a classic phishing email that Netflix would never send to you.

Dear user, We’re having some trouble with your current billing information. We’ll try again, but in the meantime you may want to update your payment details.

Most phishing emails feature proper links to the company at the bottom of the email, such as the Netflix support page or contact page. This is to trick you into thinking it’s legit. However, the link in the middle of the email goes to a different website.

Banks and Credit Card Companies

You may only have one bank account and one credit card. So when you receive an email from a bank that you don’t have an account with, it’s easy to ignore. You may even be thinking, why would they send this to me? Well, cyberthieves use spam internet servers to sent the phishing email to millions of people because they know at a percentage of those on the list will have an account with a particular bank.

This is why you will sometimes get an email that looks like it’s from your bank. Don’t worry, the scam artist probably doesn’t know you have an account with a certain bank. You are simply one of millions of people on a list.

Chase is one of the top banks that phishing emails try to mimic.  But really, there are too many banks and credit card companies to list, so it’s wise to be wary of any email from your bank.  Any information you need to know about your bank account will be within your account, so just go to your regular bookmark in your browser to login or to go Google and search for your bank.  You never have to worry if you always go directly to your bank to see if there are any important notifications for you.  Or just call you bank. 

To report a phishing email to your specific bank, search for your financial institution on Google by typing in your bank name followed by the keywords ‘report phishing email’.

Report as Phishing to Apple

Apple is a big one.  Your user name and password gives phishing attempts access to your iCloud account where all of your files are stored, including your contacts and pictures.  If you see any email that looks suspicious report it to Apple by forwarding the email to [email protected]Apple will never ask you to verify your identity using your password.  They also recommend to protect your Apple ID by using two-factor authentication.  This security measure is available with many online accounts where a code is sent to you via text or email to complete your login.  This means that even if hackers gain access to your user name and password and try to log in, you will get a notification, but unless they have access to your phone, they can’t gain access.

Courier Companies and Shipping Outlets

Couriers include companies like Fed Ex, UPS, DHL Express, Purolator, and USPS.  Shipping may also come from online stores who use couriers, such as Amazon and Target.  The email may say something line “We are having trouble delivering your shipment!”  If you are expecting a shipment, you will immediately be concerned.  If you are not expecting a shipment you may wonder why you are receiving a product when you didn’t order anything. This is probably a phishing email, but even if it isn’t look closely at the email.  It’s always best not click any links and simply go to your account directly through your browser.  If you don’t have an account with a specific store, such as Walmart, then you know it is more than likely a phishing email.  Report it to the company concerned then delete the email.

Amazon

Many people have an Amazon account.  You may get an email from Amazon asking for your to login to correct a problem.  This is more than likely phishing.  Do not login using the link in the mail. Go directly to your Amazon account from your browser to see if there are any issues.  Amazon also uses couriers and the same safety rules apply.  Amazon usually notifies online shoppers that a real shipment has been delivered to their door, but they will never put a link in that email and ask you to check on your shipment.  Forward all suspicious emails to Amazon at [email protected]

Additional Contacts to Report Phishing

If you have scrolled down to this bottom of this email looking for a company that is not listed above, below are are few safe links or email addresses to report a phishing attempt to that company. Reporting phishing is important so that collectively, we can work to shut down the hackers and scammers who are trying to steal personal information from millions of account holders around the world.

A Quick Review of What to Do When you Receive a Suspected Phishing email.

  • Don’t click any link to login to your account.  Go directly to your account via your browser bookmark or by searching for it on Google.  If you don’t have an account related to the email, it’s probably a phishing attempt and you have nothing to worry about.
  • Before deleting the phishing email, forward the email to the company the identity thieves are pretending to be.
  • Report the phishing link to Google but be careful how you copy the link to paste it on Google’s reporting page. Never click the link.  Instead, right click on the link to copy the hyperlink. Then delete the email.
  • When you forward a phishing email to any company, cc the email to the Anti-Phishing Working Group at [email protected]

Here are additional emails not written about above that you can report phishing emails to:

Report Email as Phishing to Gmail

This image below shows you how to report amy phishing attempt that is sent to your Gmail. To access this, you need to be signed into the web version of your gmail account. Reporting these emails will help reduce phishing and spam emails to your Gmail, but you should also report emails to the company being spoofed.

To report phishing to Gmail follow the steps below.  1) On an open email, select the drop down menu on the top right. 2) Select Report Phishing.Report Email Phishing to Gmail

About Google Account Security:  Since Google accounts only have one login to multiple website, including YouTube and the multiple apps within Google for Education, consider setting up Two Factor Authentication to protect your account.

Additional Resources

Make sure your computer is not infected with Malware because you clicked a phishing email, scan your computer and protect against future attacks.

Learn more about Phishing and the new ways hackers use to steal peoples personal information.  Read about Smishing (Text) and Vishing (Phone) Scams.

Share This Article

10 Tips for Safe and Efficient File Sharing

File Sharing Safety

File sharing is the process in which digital media is shared among devices. The art of file sharing is not a new thing as it began in 1967 when Alan Shugart invented the floppy disk. This technology has evolved over the years from people being able to share a single file to multiple ones by one click of a button.

Currently, there are no limits on the number of files that you can share. The process involved is both simple and straightforward.

Making Use of Safe Technological Tools

In recent years, there have been advancements in technology that now allows you to zip files and share them. There are companies that pioneer in the provision of tools for compressing, zipping, and achieving files. The beauty of using such tools is that they will reduce the size of the document without tampering with the format and appearance. They also have an option to input security measures so that files can only be accessed by authorized people alone.

But, what are the benefits of file sharing? When done safely, it:

  • It is affordable which allows teams to have access to relevant information at a low cost.
  • The process is efficient as the technology available allows you to share files promptly.
  • Based on the service that you are using, files shared can be accessed from any location.
  • It fosters collaboration especially if you are using cloud computing that allows users to edit the information online.

Currently, there are numerous ways in which you could share files safely.  It’s simply one more way to protect you, your computer and your family online.

Below are 10 tips on how to share files safely and efficiently:

1. Avoid emails

Emails may be convenient but they are not the best when sharing documents with confidential information. These platforms are prone to hacking which could result in confidential files landing in the hands of authorized personnel.

2. Update your security software

Often people forget to update their software which leaves them vulnerable. Hackers know this and tend to take advantage of systems that are not updated.

3. Encrypt with passwords

Technology has made it possible for people to incorporate passwords on files that they do want people with prying eyes to see. To ensure that a document is not easily accessible, you need to encrypt it with a complicated password that has upper and lower cases as well as symbols and numbers. When you leverage encryption, you will significantly reduce the penetrating power of various cyberattacks.

4. Change passwords often

It is recommended that you change your passwords often preferably every month. Because it can be difficult to remember to make these changes, you need to note down the dates when passwords need to be changed.

5. Use secure connection

Remote workers are among the people who are fond of sharing information among themselves. Suppose you work away from the office, you need to ensure that your connection is secure before sharing any files. Be extra careful if you are using a public WiFi.

6. Refrain from suspicious downloads

The rule is that whenever you are sharing files using digital platforms is that you never download files that you do not trust. Hackers can incorporate viruses, spyware, and adware on files to gain access to your system. Thus, you should never open downloads that you do not trust.

7. Double-check inbox emails

Working from home will have you receiving a ton of emails from various stakeholders, customers, and colleagues. It is always safe to check the sender of the email several times before opening any attachments that come with it. Sometimes a sender may appear legitimate, your job is to look keenly so that you protect your files and digital devices.

8. Utilize safe file-sharing programs

There exist programs that you can use to share files with colleagues. Among them are Enigmail., pCloud, Resilio., SpiderOak., and Signal. These programs should have features such as web editing, remote file access, and file locking as well as mobile access.

9. Refrain from clicking links

Do not make it a habit of clicking links that come with files that you receive. If you are in doubt, you should hover around the link a couple of times before clicking it. When your gut tells you that you should click a link, you need to listen to it.

10. Avoid USB drives

Flash disks and external hard drives are not the best tools to share files with them. Given their size, they are bound to get lost and are easy to steal as well. Suppose, they fall in the wrong hands, you lose valuable data.

Conclusion

File sharing is one of the most important technologies we have. It enables teams to work together onsite and remotely. However, this process is prone to the risk of hacking hence the need to share files securely.

Share This Article

Gamer Security | Protect and Play Safer

Gamer Security

Got a kid that loves to game? Or maybe you are an avid gamer yourself. Have you thought much about gamer security? There has been plenty written about protecting your home computer with an anti-virus program, but what about increased performance while gaming?

Account hacking, phishing, malware, ransomware, and social engineering are all potential cybersecurity threats of online gaming.  We’ll explore what you can do to protect yourself while gaming, plus we’ll offer solutions to improve performance without compromising security.

Online Gaming Security

When a gamer signs up for a gaming platform, they are often asked to accept terms and conditions regarding privacy policies and data usage.  Game developers typically ask for a variety information, such as names, usernames, email addresses, countries, games played, dates of birth, and languages.  But some also gather more sensitive information, including addresses and credit card details.

While this data collection helps improve the gaming experience and monitors for cheating, it’s important to be aware of how developers manage your personal details.  The more of its user data a company holds, the greater a risk when there is a breach. This is where several cyber security threats that we’ve mentioned come into play.

Here are a few steps gamers can take to protect against the dangers while gaming.

Review Privacy Policies.

Understand how information is collected and how it is stored.  When kids are playing online, it is up to the parent to be aware of the policies on any gaming platform their children are using. If possible, gamers should opt out of any non-essential data collection.

Secure Accounts

Enable MFA when possible and use robust unique passwords for each account.  Consider using a password manager to create and store them.

Use Secure Wi-Fi

Use a secure network with a strong password and updated security settings when gaming. Avoid publish Wi-Fi and consider using a VPN for added protection.

Stay Up to Date

Install updates when promoted to protect against know vulnerabilities.  This applies to both the games and devices.

Protect Personal Information

Limit information share with other players. Unlink social media accounts and keep profile visibility private to reduce the risk of exposing personal information to cybercriminals.

Remember the SLAM Method

With any suspicious or unsolicited messages, closely examine the Sender, Links, Attachments, and Message content to avoid falling for scams.

Better Gaming Solutions

Now, let’s explore gaming performance issues that tempt users to compromise their safety.

Issues with Anti-Virus Software

There is a problem that arises when the anti-virus is turned off completely because it interferes with the online gaming experience.  McAfee Gamer Security solves the debate within families regarding how much security one can compromise in order to maintain computer performance while playing.  McAfee created Gamer Security as a complete gamer software solution.  Security + Performance.

This gamer security software was not designed to merely prevent a decrease in gaming performance while staying protected online, the software boasts a faster, more quiet, and safer gaming experience thanks to cutting edge performance enhancing technologies.

Game Boost Engine

Some anti-virus programs have long had a problem with bogging down computers while you are trying to other tasks.  Gaming is more than a task.  It’s be huge drain on an operating system and requires a fast internet connection.  It also craves every ounce of CPU and RAM it can squeeze out of your operating system.  The McAfee Gamer Security program works to get more performance out of your operating system and ensures your games stay prioritized over applications running in the background.

All of this increased speed happens without you having to turn off the anti-virus program that is part of the software.  Slowdowns are bound to happen so this gamer software promises to resolve those slowdowns quickly so your game is not held back from working properly.  This is especially important when playing online with a team.

App Manager

The app manager within McAfee Gamer Security gives you control to kill or de-prioritize resource heavy apps.  While maintaining operating system performance, the software automatically saves stats from your last 5 game sessions which you can look at later.  Settings are customizable, providing intuitive control over system optimization and pop-up suppression is readily available. You can also tweak the software’s multiple settings as desired.

McAfee Gamer Security helps you achieve a smoother overall experience on your PC, from everyday performance gains thanks to the low impact MicroAV engine to the FPS stability. This also results in smoother game play delivered by their Game Boost technology. 

Pricing

Some users may not like the annual price tag on this software.  Not that it’s unusually priced above other anti-virus type programs, but the annual subscription for Game Security is only for one computer.  This may not be a problem as there may only be one gamer in the household in need of online protection, while increasing speed and customizable performance.

Gamer Online Protection with Enhanced Performance

Not to be infused with parental control software that filters content, McAfee Gamer Security is a software download that allows gamers to enhance their computer performance while stay protected with anti-virus protection.  It’s a vital tool in to help players engage safety with fellow gamers.

Gamer Security System Requirements

To operate the Gamer Security software you must have Microsoft Windows 10 version 1809 (Oct 2018 update) or later.  If you already have Windows 10 and are unsure of what version is running simply update to the latest version.  It’s a good idea anyway to turn on automotive updates for Windows to ensure your systems is always secure.  The hardware needed on your computer is 2 GB RAM | 500 MB free drive space | 1 GHz Processor.  A high-speed internet connection is recommended.

How is it faster? When McAfee did tests of their gamer security software compared to both traditional and built-in AV they found:

  • A faster boot.
  • Faster shutdown.
  • Faster standby suspend.
  • Faster suspend to hibernate.

Related Resources:

Looking for online games you can play on your PC, Mac, or Tablet?  Check out our safe online game search tool.

Share This Article