Talk to an Expert | Locations | On the Radio | Video Archive | Blog | About Us | Feedback
Blog Archives
« Indices End Trading in the Green | Main | Stocks Slip »

Digital Deception: Current Trends in Cybercrime

In December 2016, Yahoo announced that data associated with more than 1 billion user accounts had been stolen in 2013. The company believes this was a separate incident from a previously announced theft of data from 500,000 user accounts in 2014.1 Although the sheer number of compromised accounts is staggering, the Yahoo breaches are just two out of many major data breaches discovered in 2016, ranging from dating sites and Internet companies to the IRS and the U.S. Department of Justice.2

Private companies and government agencies that hold personal information are responsible for protecting that data, but even the most vigilant organization can be vulnerable. Moreover, once a breach has occurred, the aftershocks can last for years as cyber thieves exploit stolen information. Here is an overview of current cybersecurity trends and steps you can take to help protect your identity and personal accounts.

Passwords and Security Questions

An analysis of 10 million stolen passwords found that the most common password—used by 17% of users—was 123456.3 Many of the other top passwords were simple combinations of numbers or letters that could be cracked in seconds by dictionary-based hacking software. Below are some password best practices:

Don’t Reuse Passwords: Using the same password for multiple sites only makes it easier for attackers to compromise your sensitive information. Also, never disclose your password to important or private online accounts to anyone.

Use a Password Manager: Use a password manager to store and create long, cryptic passwords for all of your online accounts. Henssler Financial recommends LastPass, an award-winning password manager that saves your passwords and gives you secure access from every computer and mobile device.

If Nothing Else, Use a Passphrase: While we strongly recommend a password manager, if you do not want to use one, consider using a passphrase instead of a password. A passphrase adds a layer of security because it contains multiple words to create a phrase. Additionally, to make it more secure, substitute letters in those words with numbers or special characters. For example, HelloToMySunshine is the starting point of a passphrase. To make it more secure, substitute a few characters to transform it to #e!!o2My$un$hine. Also, you should never use personal information— important dates, addresses, nicknames, portions of your phone number or Social Security Number, etc.—as part of any password

Disable Stored Browser Passwords: Nearly all browsers and many websites in general offer to remember your passwords for future use. Enabling this feature stores your passwords in one location on your computer, making them easier for an attacker to discover if your system gets compromised. If you have this feature enabled, disable it and clear your stored passwords.

Keep in mind that security questions can be used to unlock data by thieves who claim to have lost a password. Create answers that are fictional or cannot be discovered by others.

Chips and Strips

The transition to credit cards and debit cards with embedded computer chips utilizing EMV (Europay, MasterCard, and Visa) technology has reduced fraud at checkout terminals in brick and mortar stores. But EMV technology does not protect card numbers used online; in fact, thieves have shifted efforts to digital merchants, which have seen an increase in cyber theft. EMV adoption has also stimulated an increase in new account fraud in which thieves use stolen information to create new accounts with new cards.4

The EMV rollout has been slow, and cybersecurity experts predict more widespread use of sophisticated skimmers inserted into a card reader to steal information from magnetic strip cards.5 Gas stations, a favorite target for skimmers, are not required to install EMV terminals until October 2017. When using a card reader terminal, particularly in a standalone location, be aware of anything that looks amiss, such as colors that don't match or arrows that don't line up. If you are suspicious, do not use the terminal and report the issue immediately.

Mobile Payments

The United States has been slow to adopt mobile payment technology, but 2016 represented a big step forward. Almost 40 million Americans made a "proximity payment" using their mobile phones at the point of sale, and more than 45 million transferred funds with a mobile payment peer-to-peer application.6

Paying with your smartphone could be safer than paying with plastic as long as you take the same security precautions you would on your computer and utilize security enhancements such as fingerprint access. Also be aware that hackers have begun to send malware through texts as well as emails.

Healthcare Attacks

According to an IBM security survey, the healthcare industry was the top target for cyber criminals in 2015, with over 100 million records compromised, surpassing the financial services industry.7 Cybersecurity experts predict that medical cybercrime will accelerate and spread to larger networks in 2017.8

For consumers, stolen medical information can lead to fraudulent and expensive claims, and collateral damage as thieves use personal data in electronic medical records to open other accounts.

Protect your health insurance ID card as you would a credit card, and monitor explanations of benefits (EOBs) from your insurance company and payment records from health savings accounts.

What Can You Do?

Here are some other security tips to help protect your identity:

Take an extra step. Two-step authentication, such as a text or email code along with your password, could help protect your sensitive data.

Monitor your accounts. Notify your financial institution immediately if you see suspicious activity. Early notification not only can stop the thief but may limit your financial liability.

Think before you click. Never click on a link in an email or text unless you know the sender and have a clear idea where the link will take you.

Shop secure. When shopping online, look for the secure lock symbol in the address bar and the letters https: (as opposed to http:) in the URL.

Minimize information. Provide only as much information as necessary for your purpose. If you are suspicious of any request for information, don't provide it.

Protect your Social Security Number. Your SSN is the key to a whole world of personal information. Do not carry your card in your wallet and never provide your number online unless you are on a secure IRS or Social Security Administration website.

Protect Your Most Important Account—Your Email: The single most important account to protect is your email. While most would think bank, credit card or a financial account, email is even more important because most websites still use your email address as your username and/or your primary contact for password resets. Thus, your email account contains the keys to the kingdom. If you don't use a password manager, make sure your email is secure and consider using multi-factor authentication to access your account.

If you have questions, contact the experts at Henssler Financial:

1) Yahoo, December 14 and September 22, 2016
2), 2016
3) Security, January 13, 2017
4) Javelin Strategy & Research, 2016
5, 8) Experian, 2016
6) eMarketer, November 7, 2016
7) IBM, 2016
8) Experian, 2016
Disclosures: The following information is reprinted with permission from Forefield, a division of Broadridge Financial Solutions, Inc. This article is meant to provide valuable background information on particular investments, NOT a recommendation to buy. The investments referenced within this article may currently be traded by Henssler Financial. All material presented is compiled from sources believed to be reliable and current, but accuracy cannot be guaranteed. The contents are intended for general information purposes only. Information provided should not be the sole basis in making any decisions and is not intended to replace the advice of a qualified professional, such as a tax consultant, insurance adviser or attorney. Although this material is designed to provide accurate and authoritative information with respect to the subject matter, it may not apply in all situations. Readers are urged to consult with their adviser concerning specific situations and questions. This is not to be construed as an offer to buy or sell any financial instruments. It is not our intention to state, indicate or imply in any manner that current or past results are indicative of future profitability or expectations. As with all investments, there are associated inherent risks. Please obtain and review all financial material carefully before investing. Henssler is not licensed to offer or sell insurance products, and this overview is not to be construed as an offer to purchase any insurance products.