Cyber Security: 5 things everyone should do to outsmart online criminals

Cyber Security: 5 things everyone should do to outsmart online criminals

Cyber Security: 5 things everyone should do to outsmart online criminals


1. Always be suspicious

If you receive a video, phone call, voicemail, email, or direct message, try to confirm independently with the sender that it's real.
If you don't recognize the number on a phone call, but it sounds like the person, put them on hold and independently verify it.
Someone once tried to execute a deepfake call on my mother. They sounded like my eldest daughter. My mom was 80 years old then, but the good news is that multiple people in her family were FBI agents or detectives, so she was immediately suspicious.
She called me to check, and my daughter was with me, so she knew it was fake. Other people have not been that careful in the past.


2. Listen to your phone

You know how your phone sometimes tells you your passwords have been compromised in a data leak? Some people just ignore that, which is astonishing to me.
My father was the former CEO of MasterCard and a former FBI agent himself, but he still ended up having a significant amount of money removed from his checking account due to compromised credentials that he did not reset.
Check the list of apps that have compromised passwords — you might be surprised at how many websites you have a password for in the first place — and go into the apps and change your passwords, at least for the important ones.
Don't use the same password for absolutely everything. You don't need to have 150 passwords for 150 websites — but spread them out.
I know it's a pain, but you are better safe than sorry.


3. Free WiFi is a risk

If you are going to be using free WiFi at coffee shops or stations, definitely think about installing a VPN on your phone. It's so easy.
And do not make financial transactions on a public WiFi network. You don't know who could have access to that information.


4. Lock your credit information down

It's easy. Just call the reporting agency (like Experian) and tell them you want to lock your credit bureau. They will develop a passkey for you to unlock it later.
My lifelong friend's father had his identity stolen once, and he didn't have his credit bureaus locked down.
The criminals used a false identity to purchase real estate in Brooklyn in his name and used the real estate to conduct fraudulent transactions.
It was quite a personal and financial disruption in his life.
This is something a lot of people don't do, but it's a free procedure that makes you instantly more protected against fraud.

5. Post intelligently

Whenever you are posting, always assume it could be used in some form against you. Would you still post it?
It's one thing to post pictures of you having a good time — you do you — but it's another thing to go and publicly tag every person in the photo.
For all the positive things that come from social media, it creates a treasure trove of information for bad actors. You have video, you have pictures, you have associations of friendship. You also have machine learning that can go through all of that at an incredible rate of speed — something that we've never seen before until now.
There are service platforms and ransomware on the dark web that accelerate these exploits. That's also how deepfakes are becoming more and more convincing — they use voice and image models from videos and photos that are out there already.


    • Related Articles

    • Cyber Security: Phishing Attacks

      Cyber Security: Phishing Attacks What Is Phishing? Phishing is a fraud technique where a malicious actor sends messages impersonating a legitimate individual or organization, usually via email or other messaging system. Many cyber attackers ...
    • Cyber Security: Tax Fraud and IRS Impersonation

      Cyber Security: Tax Fraud and IRS Impersonation Here is some helpful information to help you navigate the waters. Scammers often reach out pretending to be IRS employees to get your information. But does the IRS call or text? The first point of ...
    • Cyber Security: The Six Spooky Threats to Your Privacy and Identity

      Cyber Security: The Six Spooky Threats to Your Privacy and Identity Summary: This Halloween season and beyond, watch out for data brokers, dark web cybercriminals, and other threats and nuisances creeping around online. These fiendishly persistent ...
    • Cyber Security: Vishing – Are You Getting Too Many Scam Calls?

      Cyber Security: Vishing – Are You Getting Too Many Scam Calls? Are You Getting Too Many Scam Calls? 1 in 3 Americans report falling victim to phone scams, with 20% more than once. Total losses to phone scams totaled $39.5 billion in the past 12 ...
    • Cyber Security: Data Brokers – What Is Your Data Worth?

      Cyber Security: Data Brokers – What Is Your Data Worth? A data broker (also known as an information product company) is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to be used by other ...