Cybersecurity

10 New Year's Resolutions to Scam-Proof Your Life

February 2, 2021

Fraudsters do not take holidays. They work continuously, targeting individuals through phone calls, emails, text messages, social media, and even in-person approaches.

Fraudsters do not take holidays. They work continuously, targeting individuals through phone calls, emails, text messages, social media, and even in-person approaches. The beginning of a new year is a good moment to review your defenses and commit to a few habits that make you a harder target. Here are ten resolutions worth keeping.

1. Update Your Passwords. Create a separate, strong password for each of your important online accounts. Reusing the same password across multiple sites means a single breach can compromise all of them. If you find it difficult to track unique passwords for every account, a password manager does the work for you.

2. Enable Two-Factor Authentication. Add a second layer of verification beyond your password wherever it is available. A code sent to your phone or generated by an authenticator app means that even if someone obtains your password, they still cannot access your account without that second step.

3. Do Not Engage Unsolicited Contacts. Hang up on unexpected phone calls asking for personal information or action. Delete suspicious emails without clicking links or opening attachments. Treat any communication you did not initiate with a healthy level of skepticism, regardless of how official it looks.

4. Protect Your Most Sensitive Information. Your Social Security number, Medicare number, and financial account details are the most valuable targets for identity thieves. Share them only when absolutely necessary and only through channels you have verified independently.

5. Verify Before You Act. Scammers frequently impersonate friends, family members, government agencies, and businesses. If someone contacts you with an unusual request, whether it is for money, personal information, or help resolving an urgent problem, verify the request through a separate, trusted channel before responding. Do not use contact information provided by the person making the request.

6. Freeze Your Credit. A security freeze at all three major credit bureaus, Equifax, Experian, and TransUnion, prevents new credit accounts from being opened in your name without your explicit authorization. It is free to place and lift, and it is one of the most effective tools available for preventing identity theft. You can also request your free annual credit reports at annualcreditreport.com to review them for inaccuracies or unauthorized accounts.

7. Set Up Account Alerts. Most banks, credit card issuers, and investment platforms allow you to configure alerts for transactions above a certain amount or for unusual activity. Set these up so that unauthorized activity triggers a notification to you immediately rather than going unnoticed for weeks.

8. Keep Security Software Current. Make sure antivirus and anti-malware software on all of your devices is installed and updated. Outdated security software leaves known vulnerabilities unaddressed and reduces your protection against new threats.

9. Never Pay with a Gift Card. Gift cards are a preferred payment method for scammers because the transactions are difficult to trace and impossible to reverse. No legitimate business, government agency, or utility company will ever ask you to settle a debt or fee with a gift card. If someone asks you to do this, it is a scam.

10. Slow Down and Ask for Help. Scammers rely on urgency and secrecy. If you feel pressured to act immediately, or someone urges you not to tell anyone else about the situation, stop. Those are warning signs of a scam. Talk to someone you trust before taking any action involving money or personal information.

Stay Vigilant Year-Round.

These practices protect individuals, but they also protect businesses. When employees carry good security habits into the workplace, the entire organization benefits. Cyber One Solutions helps businesses build security-aware cultures and implement the technical controls that support them. Contact us today to schedule a consultation.