The Lighter Side Of The Cloud – The Migration Strategy
The Lighter Side Of The Cloud – Application Forecaster
The Lighter Side Of The Cloud – Black Friday Online
3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

3 Ways To Protect Your Financial Data

Cybersecurity

Recent retail foibles have us all a bit on edge about our personal data. High-profile security breaches at Target and on SnapChat remind us it can happen anywhere, to anyone. It leaves us marveling a bit (not in a good way) at how a simple transaction can cause a great deal of angst in the weeks after it.

I never go to Target,” one friend said at a post-holiday party to me. “But I did just before Christmas. Not even for gifts, but for shampoo. And I used my debit card.

“So now, I’m checking my statement every day, calling about the balance, hoping the bank is also keeping an eye out for me …”

Retailers and social-media administrators work hard to protect your data, and breaches like the ones Snapchat and Target recently experienced are nightmares for those entities. The problem is, hackers and scammers work just as hard to beat the system and get to your data.

There’s no such thing as “hacker proof,” it turns out.

Here’s what happened

1. Target

Hackers accessed data for as many as 40 million credit and debit cards used at Target locations in December, including encrypted data that contained personal identification numbers. Target claims the PIN data is not at risk, but cybercrime experts still warn against potential of risk.

Action: Target offers free credit monitoring for those who might have been affected by the breach. If you were affected, that’s not much help now, but at least you’re protected from another attack.

2. SnapChat

This photo-messaging app predicated on privacy – messages disappear after they’re seen – was breached with a “find friends” feature that revealed data for 4.6 million users. Although this breach had no financial implications, the compromise was of concern to many SnapChat customers.

Action: Site administrators issued a new version of the app that allowed users to opt out of the “find friends” feature.

Here’s what you can do to protect yourself

Here are three things you can do today to help keep yourself a step ahead of the bad guys.

1. Register for free credit monitoring

Companies such as Credit Karma will protect against identity theft and unauthorized purchases. It monitors your credit nightly, and sends an email if anything unusual appears, including new accounts opened in your name. Credit Karma also safeguards against inaccurate credit reports.

Bonus: In the market for financial services? Credit Karma also offers consumer reviews for credit cards, mortgages and insurance purchases too.

2. Protect your data—physically and online

Your social security card should never live in your wallet. Also, your passwords and usernames shouldn’t be kept on a piece of paper, in your wallet, car or home. Never give out your social security number to anyone who calls you and claims they’re from your financial institution.

Banks, credit card providers, and utility companies will never do that. In the wake of the Target breach, companies like Verizon and Wells Fargo have even proactively notified their customers that they never solicit information via email or phone call.

Bonus: Multi-platform app LastPass manages and encrypts passwords across all your services.

3. Set up mobile alerts

Some financial institutions, such as Citizens Bank, offer mobile alerts of any account activity. These services will send you a message if your account balance dips below a specified amount, signal a check clearance, and even send your five most recent transactions on a schedule you set.

Most national banks and large credit card companies offer similar services, so take advantage of them.

Bonus: Consider changing your debit card’s PIN number on biannually or annually, or if you suspect your information was released in a breach like Target’s. Although PIN information is encrypted once you enter it on the keypad, it’s good peace of mind to actively change the first wall of defense from someone withdrawing money in your name from an ATM.

4. Protect your network

Keep your electronic data safe from prying eyes at home by securing your WiFi network. Many Internet providers include wireless routers with their service. Setting a protected network is easy, and worth the five minutes spent.

Data stored on the cloud is vulnerable to hackers. Massachusetts Institution of Technology researchers have developed protection against hacks to memory-access pattern analysis (the means by which computers store and access data) by broadcasting false information to remote server data requests.

Bonus: When you don’t have other people jumping on your wireless service, you could experience faster speeds. Lock up that wireless signal!

By Alexis Caffrey

Alexis is a freelance writer with a focus on technology, new media, and design . You can reach Alex via @AlexisCaffrey or alexiscaffrey.com.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Popular

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford…

2014 Future Of Cloud Computing Survey Results

2014 Future Of Cloud Computing Survey Results

Engine Yard Joins North Bridge Venture Partners, Gigaom Research and Industry Collaborators to Unveil 2014 Future of Cloud Computing Survey Results SAN FRANCISCO, CA–(Marketwired – Jun 25, 2014) – Engine Yard, the leading cloud application management platform, today announced its role as a collaborator in releasing the results of the fourth annual Future of Cloud Computing Survey,…

Recent

The Importance Of Cloud Security For Wearable Technology

The Importance Of Cloud Security For Wearable Technology

Wearable Technology Starts With Cloud Security The integration of wearable technology into our society is all but inevitable. Today, major players in the wearable tech field include Google, Fitbit, Boston Scientific and Apple. As users continue to demand ever increasing availability and functionality from their devices, so do security concerns for wearable tech. The future…

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines for Maximum Upselling and Cross-Selling in a World Gone Cloud With the growth of the subscription economy, companies can no longer assume that a sale means that the deal is closed. Companies need to prove their worth every minute of every hour, every hour of every day and so on. A big…

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security Over the past decade, drones, also known as UAVs (unmanned aerial vehicles), have become a fact of life. Beginning as underpublicized but extremely effective items in the U.S. military’s arsenal, drones have since come into wide use by government agencies for everything from geographic surveys to law…

Contact Us

Sending
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising