3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

Cybersecurity

Recent retail foibles have us all a bit on edge about our personal data. High-profile security breaches at Target and on SnapChat remind us it can happen anywhere, to anyone. It leaves us marveling a bit (not in a good way) at how a simple transaction can cause a great deal of angst in the weeks after it.

I never go to Target,” one friend said at a post-holiday party to me. “But I did just before Christmas. Not even for gifts, but for shampoo. And I used my debit card.

“So now, I’m checking my statement every day, calling about the balance, hoping the bank is also keeping an eye out for me …”

Retailers and social-media administrators work hard to protect your data, and breaches like the ones Snapchat and Target recently experienced are nightmares for those entities. The problem is, hackers and scammers work just as hard to beat the system and get to your data.

There’s no such thing as “hacker proof,” it turns out.

Here’s what happened

1. Target

Hackers accessed data for as many as 40 million credit and debit cards used at Target locations in December, including encrypted data that contained personal identification numbers. Target claims the PIN data is not at risk, but cybercrime experts still warn against potential of risk.

Action: Target offers free credit monitoring for those who might have been affected by the breach. If you were affected, that’s not much help now, but at least you’re protected from another attack.

2. SnapChat

This photo-messaging app predicated on privacy – messages disappear after they’re seen – was breached with a “find friends” feature that revealed data for 4.6 million users. Although this breach had no financial implications, the compromise was of concern to many SnapChat customers.

Action: Site administrators issued a new version of the app that allowed users to opt out of the “find friends” feature.

Here’s what you can do to protect yourself

Here are three things you can do today to help keep yourself a step ahead of the bad guys.

1. Register for free credit monitoring

Companies such as Credit Karma will protect against identity theft and unauthorized purchases. It monitors your credit nightly, and sends an email if anything unusual appears, including new accounts opened in your name. Credit Karma also safeguards against inaccurate credit reports.

Bonus: In the market for financial services? Credit Karma also offers consumer reviews for credit cards, mortgages and insurance purchases too.

2. Protect your data—physically and online

Your social security card should never live in your wallet. Also, your passwords and usernames shouldn’t be kept on a piece of paper, in your wallet, car or home. Never give out your social security number to anyone who calls you and claims they’re from your financial institution.

Banks, credit card providers, and utility companies will never do that. In the wake of the Target breach, companies like Verizon and Wells Fargo have even proactively notified their customers that they never solicit information via email or phone call.

Bonus: Multi-platform app LastPass manages and encrypts passwords across all your services.

3. Set up mobile alerts

Some financial institutions, such as Citizens Bank, offer mobile alerts of any account activity. These services will send you a message if your account balance dips below a specified amount, signal a check clearance, and even send your five most recent transactions on a schedule you set.

Most national banks and large credit card companies offer similar services, so take advantage of them.

Bonus: Consider changing your debit card’s PIN number on biannually or annually, or if you suspect your information was released in a breach like Target’s. Although PIN information is encrypted once you enter it on the keypad, it’s good peace of mind to actively change the first wall of defense from someone withdrawing money in your name from an ATM.

4. Protect your network

Keep your electronic data safe from prying eyes at home by securing your WiFi network. Many Internet providers include wireless routers with their service. Setting a protected network is easy, and worth the five minutes spent.

Data stored on the cloud is vulnerable to hackers. Massachusetts Institution of Technology researchers have developed protection against hacks to memory-access pattern analysis (the means by which computers store and access data) by broadcasting false information to remote server data requests.

Bonus: When you don’t have other people jumping on your wireless service, you could experience faster speeds. Lock up that wireless signal!

By Alexis Caffrey

Alexis is a freelance writer with a focus on technology, new media, and design . You can reach Alex via @AlexisCaffrey or alexiscaffrey.com.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and