JPS Newton LLC
Skip to content
Office971-340-4832
7180 SW Fir Loop Suite 200, Tigard, OR 97223
Hours8:30 am - 5 pm, Monday - Friday
JPS Newton LLC
  • Individuals
    • Individuals
    • Retirement Planning
    • Portfolio Management
    • Distributions & Social Security
  • Companies & Organizations
  • Acquisitions
  • Our Team
  • Events
  • Blog
  • Contact Us
Cybercrime: What You Should Know & How to Protect Yourself
February 4, 2020in Cybercrime0by John Newton
1547

Cybercrime: What You Should Know & How to Protect Yourself

According to the Federal Trade Commission (FTC), identity theft is the fastest growing crime in America, affecting nearly 10 million people between 2010 and 2014. Further, the 2015 Identity Fraud Study released by Javelin Strategy & Research calculated that in 2014 there was a new identity fraud victim every two seconds.1

This crime occurs when a thief obtains confidential information — including passwords, personal ID numbers, Social Security numbers, or an account number used with a financial institution — and uses it to commit fraud. Identity thieves use a victim’s stolen information to open bank and brokerage accounts, run up bills for credit card purchases, obtain loans, and commit other forms of financial fraud.

Criminals obtain a victim’s personal information in a number of ways — both online and off. But as incidents of identity theft grows, so too does the arsenal of tools and sophistication level of techniques used to perpetrate the crimes.

Cybercrime: A Rapidly Shifting Model

Although online crime is a fast-moving target, currently, the primary methods in use by identity thieves are social engineering and phishing — or typically a combination of both.

As the term implies, social engineering relies heavily on human interaction and often involves tricking unsuspecting victims into breaking normal security procedures. In short, it is a way for criminals to gain access to your computer or mobile device and the sensitive personal data it stores. For instance, a social engineer may use text messaging to contact a mobile device inviting the user to click on a link to a bogus website where the thieves collect user credentials and other personal information.

Similar results can be achieved through a phishing attack, in which the criminal uses email to lure victims to fake websites and then gain access to their passwords and usernames, credit card numbers, and other key data. Phishing emails often appear to be from a legitimate company that the victim recognizes.

In yet another instance, attackers may inject infected “malicious” code onto your computer via email attachments, links contained in emails, infected search engine results, or through videos and documents on legitimate websites, particularly social networking sites. In the mobile device world, criminals can corrupt a legitimate smartphone app and upload it to a third-party site. If users innocently install the app, they expose their devices to assaults by hackers who collect personal user data, change device settings, and sometimes even control the device remotely.

Don't Be a Victim

In today’s 24/7/365 world, it is nearly impossible to secure all sources of personal information that may be “out there” waiting to be intercepted by eager thieves. But you can help minimize your risk of loss by following a few simple hints offered by the Federal Bureau of Investigation (FBI):

  • Never divulge your credit card number or other personally identifying information over the Internet or telephone unless you initiate the communication.
  • Reconcile your bank account monthly, and notify your bank of discrepancies immediately.
  • Actively monitor your online accounts to detect suspicious activity. Report unauthorized financial transactions to your bank, credit card company, and the police as soon as you detect them.
  • Review a copy of your credit report at least once each year. Notify the credit bureau in writing of any questionable entries and follow through until they are explained or removed.
  • If your identity has been assumed, ask the credit bureau to add a statement to that effect to your credit report.
  • If you know of anyone who receives mail from credit card companies or banks in the names of others, report it to local or federal law enforcement authorities.

Finally, be very wary of any email or text message expressing an urgent need for you to update your personal information, activate an account, or verify your identity. Practice similar caution with email attachments and downloadable files and keep your computers protected with the latest security updates and virus protection software.

1“Identity Theft and Cyber Crime,” copyright 2016, Insurance Information Institute, Inc.

Because of the possibility of human or mechanical error by Wealth Management Systems Inc. or its sources, neither Wealth Management Systems Inc. nor its sources guarantees the accuracy, adequacy, completeness or availability of any information and is not responsible for any errors or omissions or for the results obtained from the use of such information. In no event shall Wealth Management Systems Inc. be liable for any indirect, special or consequential damages in connection with subscriber’s or others’ use of the content.

Bank Account Theft credit card theft cyberattack cybercrime how to prevent cybercrime identity theft social engineering social security theft
Facebook
Twitter
Google+
LinkedIn
Pinterest
54321
(0 votes. Average 0 of 5)

Post navigation

Previous PostWho’s on Your Dream Team?
Tags
401k Annuities Conference Board Leading Economic Index employer-sponsored savings plans employer retirement plans environmental investing environmental stocks ESG funds finance industry Financial Advisor financial planning green investing how to invest investing investments investment strategy IRA job retirement benefits LEI life insurance lpl financial medicaid medicare oregon oregon financial advisor Pacific Northwest Portland Portland, Oregon Portland Oregon Financial Advisor recession retirement retirement age retirement benefits retirement planning retirement savings Roth IRA servignat says smart investing social security stock stock market stocks sustainable investing tax refund traditional ira
About JPS Newton
JPS Newton LLC
Since 2003, the team at JPS Newton has worked towards improving retirement readiness because we believe that every person should enjoy their later years.
Recent Posts
  • Cybercrime: What You Should Know & How to Protect Yourself
  • Who’s on Your Dream Team?
  • Cheat Sheet for Knowing Your Retirement Age
  • Happy Birthday to the 401(k)!
  • ESG Funds: What Are They and Why Are They So Popular in Today’s Market?
Head office
  • 7180 SW Fir Loop, Tigard OR 97223
    (971) 340-4832
  • Mon-Fri: 9:00 - 5:00 pm
Quick Links
  • Individuals
  • Companies & Organizations
  • Acquisitions
  • Our Team
  • Events
  • Contact
© 2022 JPS Newton LLC. All Rights Reserved.

The LPL Financial Registered Representatives associated with this site may only discuss and/or transact securities business with residents of the following states: Oregon, California, Washington, Arizona.

Securities offered through LPL Financial, Member FINRA/SIPC, www.FINRA.org and www.sipc.org. Investment advice and financial planning offered through Financial Advocates Investment Management, DBA JPS Newton, a registered investment advisor. Financial Advocates Investment Management, JPS Newton and LPL Financial are separate entities.