Cybersecurity
Farmer

Protect yourself and your business

Arming yourself with knowledge on how cybercriminals operate — and the tricks they have up their sleeves — is the best defense against cyberattacks for your household or business.

What are three simple measures you can take to protect your information from these malicious cyberattackers?

Protect yourself and your business

Arming yourself with knowledge on how cybercriminals operate — and the tricks they have up their sleeves — is the best defense against cyberattacks for your household or business.

What are three simple measures you can take to protect your information from these malicious cyberattackers?

Farmer
Identify and avoid scam emails, texts and calls that seek to steal your money
chevronUp chevronDown

Attackers may hack into potential borrower email accounts, wait for the right time, then try to trick victims and redirect legitimate payments to themselves. 

These attempts appear to come from a credible source and are timed to perfection … because they've been watching. Hackers may pounce right when a loan is closing and attempt to provide a last-minute change to wiring instructions. Blindly following the instructions and ignoring the red flags could result in borrowers wiring money to the attackers. These instantaneous transfers of money are almost impossible to recover if sent to the wrong source.

Watch for these red flags in email, text and voicemail messages:

      Urgency: act NOW
      Authority: it looks official 
      Emotion: inspires panic, fear, hope or curiosity

If you've received a suspicious email:

  • Call the institution directly using the phone number on its website
  • Send a new email using the address you have on file and NEVER respond to an email that appears suspicious

In the meantime, protect your email account by enabling multifactor authentication (MFA) to prevent a hacker from gaining access.

Secure and update your devices so they cannot be hijacked
chevronUp chevronDown

Don’t give attackers an easy way in. Keeping your devices up to date secures them from the latest risks. Do the following: 

Cellphones 

  • Enable lock screen PIN/password and biometrics (fingerprint/face ID), and don’t reuse passwords between devices.
  • Set the device to automatically update when the latest software versions are available.
  • Enable cloud backups.
  • Enable “find my device” if available. You can track the location of a stolen device, lock it remotely, erase data remotely and retrieve backup data from the device.

Laptop/desktop 

  • Enable passwords and biometrics if available.
  • Use drive encryption technology that can help protect your files even if the drive is stolen. BitLocker (Windows) and FileVault (Mac) are built into computers and are a free service. Encrypted files are inaccessible without the correct PIN.
  • Ensure your antivirus software is enabled; it’s built-in and free with most modern operating systems.
  • Keep your operating system up to date. Enable automatic updates from the manufacturer.
  • Back up your data, preferably disconnected from any network, but use a cloud provider if necessary. These can be scheduled to occur real-time.
  • Enable “find my device” if available. You can track the location of a stolen device, lock it remotely, erase data remotely and retrieve backup data from the device.
  • Turn on your built-in firewall. It’s built into your operating system and adds another layer of security on your system that will ensure connections to your computer are legitimate.
  • Use a password manager to securely store your accounts and passwords. These services can also help with password strength along with resetting passwords for you.
Use hard-to-guess passwords to stop accounts from being hijacked
chevronUp chevronDown

Cybercriminals prey on people who use simple and easy-to-guess passwords, reused passwords and unchanged default passwords.

  • Use a unique password for each service, device and account.
  • Change default passwords for each service, device and account, including your Wi-Fi network. Unchanged default administrator passwords make easy targets when attackers gain access.
  • Make your password strong and unique to every device and service. It needs to be both complex and long to avoid easy guesses by malicious actors that use dictionaries or listings of leaked passwords available on the dark web.
  • Don’t use personal identifiers.
  • Enable two-factor/multifactor authentication. Even if your password is guessed, having a code sent to your phone by text or an authenticator app means a malicious actor still can’t access your device or account.
  • Use a password manager to securely store your accounts and passwords. These services can also help with password strength along with resetting passwords for you.
Back To Top