3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

Cybersecurity

Recent retail foibles have us all a bit on edge about our personal data. High-profile security breaches at Target and on SnapChat remind us it can happen anywhere, to anyone. It leaves us marveling a bit (not in a good way) at how a simple transaction can cause a great deal of angst in the weeks after it.

I never go to Target,” one friend said at a post-holiday party to me. “But I did just before Christmas. Not even for gifts, but for shampoo. And I used my debit card.

“So now, I’m checking my statement every day, calling about the balance, hoping the bank is also keeping an eye out for me …”

Retailers and social-media administrators work hard to protect your data, and breaches like the ones Snapchat and Target recently experienced are nightmares for those entities. The problem is, hackers and scammers work just as hard to beat the system and get to your data.

There’s no such thing as “hacker proof,” it turns out.

Here’s what happened

1. Target

Hackers accessed data for as many as 40 million credit and debit cards used at Target locations in December, including encrypted data that contained personal identification numbers. Target claims the PIN data is not at risk, but cybercrime experts still warn against potential of risk.

Action: Target offers free credit monitoring for those who might have been affected by the breach. If you were affected, that’s not much help now, but at least you’re protected from another attack.

2. SnapChat

This photo-messaging app predicated on privacy – messages disappear after they’re seen – was breached with a “find friends” feature that revealed data for 4.6 million users. Although this breach had no financial implications, the compromise was of concern to many SnapChat customers.

Action: Site administrators issued a new version of the app that allowed users to opt out of the “find friends” feature.

Here’s what you can do to protect yourself

Here are three things you can do today to help keep yourself a step ahead of the bad guys.

1. Register for free credit monitoring

Companies such as Credit Karma will protect against identity theft and unauthorized purchases. It monitors your credit nightly, and sends an email if anything unusual appears, including new accounts opened in your name. Credit Karma also safeguards against inaccurate credit reports.

Bonus: In the market for financial services? Credit Karma also offers consumer reviews for credit cards, mortgages and insurance purchases too.

2. Protect your data—physically and online

Your social security card should never live in your wallet. Also, your passwords and usernames shouldn’t be kept on a piece of paper, in your wallet, car or home. Never give out your social security number to anyone who calls you and claims they’re from your financial institution.

Banks, credit card providers, and utility companies will never do that. In the wake of the Target breach, companies like Verizon and Wells Fargo have even proactively notified their customers that they never solicit information via email or phone call.

Bonus: Multi-platform app LastPass manages and encrypts passwords across all your services.

3. Set up mobile alerts

Some financial institutions, such as Citizens Bank, offer mobile alerts of any account activity. These services will send you a message if your account balance dips below a specified amount, signal a check clearance, and even send your five most recent transactions on a schedule you set.

Most national banks and large credit card companies offer similar services, so take advantage of them.

Bonus: Consider changing your debit card’s PIN number on biannually or annually, or if you suspect your information was released in a breach like Target’s. Although PIN information is encrypted once you enter it on the keypad, it’s good peace of mind to actively change the first wall of defense from someone withdrawing money in your name from an ATM.

4. Protect your network

Keep your electronic data safe from prying eyes at home by securing your WiFi network. Many Internet providers include wireless routers with their service. Setting a protected network is easy, and worth the five minutes spent.

Data stored on the cloud is vulnerable to hackers. Massachusetts Institution of Technology researchers have developed protection against hacks to memory-access pattern analysis (the means by which computers store and access data) by broadcasting false information to remote server data requests.

Bonus: When you don’t have other people jumping on your wireless service, you could experience faster speeds. Lock up that wireless signal!

By Alexis Caffrey

Alexis is a freelance writer with a focus on technology, new media, and design . You can reach Alex via @AlexisCaffrey or alexiscaffrey.com.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

New Funding For Acumatica ERP Cloud Business – $13 Million Invested

New Funding For Acumatica ERP Cloud Business – $13 Million Invested

Acumatica ERP Cloud Business Acumatica, a well known ERP cloud services company has raised over $13 millions in new funding led by Bain Capital Owned-MYOB. This is exciting news for the company and demonstrates the high level of adoption and commitment by their clients and partners. This investment validates the market acceptance of the Acumatica solution,” said

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

“I don’t want to fight old battles,” says Microsoft CEO Satya Nadella. “I want to fight new ones.” It’s Sunday evening, and Nadella is sitting in a glass-enclosed room at the back of a Japanese restaurant in San Francisco’s North Beach neighborhood, eating sushi with a few reporters. The post Why Microsoft CEO Satya Nadella Loves

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

The US tech giant reported a 16 per cent jump in iPhone sales between July and September, and the strongest growth in Mac computer shipments in years. Read the source article at dailymail.co.uk About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of