There’s been a lot in the news lately about identity theft and data breaches; the Federal Trade Commission lists, Equifax, Yahoo and the IRS, just to name a few. Any of these breaches leaves your information open to criminals, also known as identity theft. However, information can also get into the wrong hands when cyber-attackers hack into your company network. So what can you do about it?


Prevent ID Theft

Preventing Identity theft and cyber-attacks to the company involves making simple but crucial decisions throughout your workflow. The Federal Bureau of Investigation lists six easy but effective ways to limit your risk of being a victim of cyber-attacks and identity theft.

·        Keep your firewall turned on:

o   Your firewall can be in the form of software or hardware protection.

o   Check with your IT support to ensure the firewall is protecting properly and updated.

·        Install and maintain antivirus software:

o   This keeps the virus from further infecting your computer and removes them.

o   Make sure that your antivirus software is updated. Most have the ability to update automatically.

·        Install and maintain antispyware technology:

o   Spyware collects data from your computer without your consent.

o   Operating systems can offer free antispyware software. There is also inexpensive software to purchase.

o   Beware of downloading free antispyware software online. Some are fake and can actually contain the spyware itself.

·        Maintain your Operating system:

o   Updates keep your security software up-to-date; keeping hackers at bay.

·        Be vigilant about what you download:

o   Do not open attachments from unknown email addresses

o   Be careful of forwarded messages. They can contain cyberattacks as well.

o   Be careful of what websites you download from. Make sure they are reputable.

·        Turn off your computer:

o   This severs the connection for hackers to get their malicious code onto your computer.

By using these six methods, you can help manage your risk of cyber-attacks and identity theft. If you have more questions about your specific security infrastructure, talk to your IT professionals. I hope you enjoyed this article.