Protecting yourself, your family and your personal information is an important part of what you do everyday.  The threats are numerous and wide  ranging.  We've grouped those threats into some basic categories along with some recommendations on how to manage them effectively.  Take a minute to review the information and better protect yourself.

Types of Threats
Natural disasters

Examples include:

  • Storms
  • Floods
  • Ice storms
Other disasters

Examples include:

  • Fire
  • Electrical failure
  • Plumbing failure
Utility and communication interruption

Examples include:

  • Electricity interruption
  • Telephone service interruption
    • Voice service
    • Data service
Property crime

Examples include:

  • Theft
  • Vandalism

Examples include:

  • Social engineering
    • Telephone call
    • Phishing
  • Account compromise or takeover
    • Bank account
    • Email account
    • Telephone account
Financial crime

Examples include:

  • Deposit accounts
  • Wire fraud
How Cyberware incidents occur

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Examples include:

  • Infected website
  • Infected e-mail
  • Removable media
Cryptographic ransomware

A type of malicious software designed to block access to a computer system until a sum of money is paid. Examples include:

  • Infected website
  • Infected e-mail
E-mail account takeover - Phishing

Unsolicited e-mail request seeking information such as your e-mail password or bank account information.

  • Often involves a fake login screen designed to imitate the legitimate one
Bank account compromise

When someone acquires your security controls and gains access to your account.  Examples include:

  • Phishing
  • Social engineering
  • Online banking
Data theft

When someone gains access to your personal information.  Examples include:

  • Device theft
  • E-mail content
  • Cloud Storage (data breach)
  • Removable media
Protect your data
Data backups Back up your computer frequently
  • Perform full backups several times a year
  • Perform partial backups as needed
  • Store back ups offsite
Data protection

Use antivirus software

Use a personal firewall if possible

Secure personal information on your computer

  • With secure passwords and ID's

Store personal information in a secure area

  • In a location away from your computer
  • In a secure vault

If necessary, store data back ups in a different location than your computer

  • Perhaps at work

Restrict access to your devices

Removable media

Great to use if your computer is in a common area

  • Optical (CD/DVD)
  • USB Devices
    • "Thumb" drives
    • External hard drives
    • Memory cards

Personal WiFi

  • Secure your internet connection
  • Keep your login credentials private

Public WiFi

  • Don't access sensitive information over an unsecured network 
  • Vigilance
  • Limit webmail access
  • Verify by phone
  • Keep your login credentials private
  • Do not open emails from unknown sources
  • Do not click links to unknown content
Computers and data

Restore from backup

Bank accounts

Notify Fidelity Bank (1.800.220.2497)

  • Close impacted accounts
  • Open new ones with tighter security controls

Notify law enforcement

Wire fraud

Notify Fidelity Bank (1.800.220.2497)

Notify law enforcement

Customer information

Investigate the extent of the compromise

Contain breach ASAP (As Soon As Possible)

Notify customers

E-mail accounts

Disable account

Change password

Re-enable account


Disinfect device

Restore applications and data

Cryptographic ransomware

Restore data from backup

Monetary loss/liability




Cybersecurity for Small Business (FCC)

Cyber Security (Louisiana GOHSEP)

Stay Safe Online (NCSA)


Internet Crime Complaint Center (IC3) (FBI)

Fidelity Customer Education Site (Fidelity Bank)

The views and strategies described may not be suitable for everyone.

This material has been provided for informational purposes only.