View all posts

Protecting Your Information

Protecting Your Information

What You Can Do

Protecting yourself, your family and your personal information is an important part of what you do every day. The threats are numerous and wide-ranging. We've grouped those threats into some basic categories along with some recommendations on how to manage them effectively. Take a minute to review the information and better protect yourself.

{beginAccordion}

Types Of Threats

Natural Disasters

  • Storms
  • Floods
  • Ice storms

Other Disasters

  • Fire
  • Electrical failure
  • Plumbing failure

Utility and communication interruption

  • Electricity interruption
  • Telephone service interruption
  • Voice service
  • Data service

Property crime

  • Theft
  • Vandalism

Cybercrime

  • Social engineering
  • Telephone call
  • Phishing
  • Account compromise or takeover
  • Bank account
  • Email account
  • Telephone account

Financial crime

  • Deposit accounts
  • Wire fraud

How Cyberware Incidents Occur

Malware

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Examples include:

  • Infected website
  • Infected e-mail
  • Removable media

Cryptographic ransomware

A type of malicious software designed to block access to a computer system until a sum of money is paid. Examples include:

  • Infected website
  • Infected e-mail

E-mail account takeover — Phishing

Unsolicited e-mail request seeking information such as your e-mail password or bank account information. Often involves a fake login screen designed to imitate the legitimate one.

Bank account compromise

When someone acquires your security controls and gains access to your account. Examples include:

  • Phishing
  • Social engineering
  • Online banking

Data theft

When someone gains access to your personal information. Examples include:

  • Device theft
  • E-mail content
  • Cloud storage (data breach)
  • Removable media

Protect Your Data

Data backups

Back up your computer frequently:

  • Perform full backups several times a year
  • Perform partial backups as needed
  • Store back-ups offsite

Data protection

  • Use antivirus software
  • Use a personal firewall if possible
  • Secure personal information on your computer with secure passwords and ID's
  • Store personal information in a secure area:
    • In a location away from your computer
    • In a secure vault
  • If necessary, store data back-ups in a different location than your computer:
    • Perhaps at work
  • Restrict access to your devices

Removable media

Great to use if your computer is in a common area:

  • Optical (CD/DVD)
  • USB Devices
  • "Thumb" drives
  • External hard drives
  • Memory cards

WiFi

Personal Wifi:

  • Secure your internet connection
  • Keep your login credentials private

Public WiFi:

  • Don't access sensitive information over an unsecured network

E-mail

  • Vigilance
  • Limit webmail access
  • Verify by phone
  • Keep your login credentials private
  • Do not open email from unknown sources
  • Do not click links to unknown content

Recovery

Bank accounts

Here's what to restore from backup:

  • Notify Fidelity Bank (1.800.220.2497)
  • Close impacted accounts
  • Open new ones with tighter security controls
  • Notify law enforcement

Wire fraud

Here's what to restore from backup:

  • Notify Fidelity Bank (1.800.220.2497)
  • Notify law enforcement

Customer information

Here's what to restore from backup:

  • Investigate the extent of the compromise
  • Contain breach ASAP (As Soon As Possible)
  • Notify customers

Email accounts

Here's what to restore from backup:

  • Disable account
  • Change password
  • Re-enable account

Malware

Here's what to restore from backup:

  • Disinfect device
  • Restore applications and data

Cryptographic ransomware

Here's what to restore from backup:

  • Restore data from backup

Monetary loss/liability

Here's what to restore from backup:

  • Budget
  • Insurance

Resources

{endAccordion}

This material has been provided for informational purposes only. The views and strategies described on this page may not be suitable for everyone.