What Is Cyber?

Cyber is a prefix used to describe anything related to the computer and information age. How does cyber impact you though? The real question is what doesn’t it impact? Cyber is in every aspect of our lives, regardless if we want it to be or not. Owning devices with embedded computers means that as consumers, we must have at least a basic understanding of how to protect them. By following a few easy steps, you can help keep your digital footprint more secure:

1. Create Secure Passwords

Always change the default password on any smart device that you connect to your network. Left unchanged, default passwords provide an easy attack vector for home network equipment; if the owner also connects to a corporate network, that risk extends to the business as well. An attacker who logs into a device successfully is likely to have administrative-level access. Default passwords are only ever intended to be placeholders, used only for the initial setup of hardware or after a factory reset. To counteract the security issues of default passwords, device owners should change the default value to a strong password when they first configure a device. If you struggle with remembering multiple passwords, consider a password manager. A password manager keeps track of all of your passwords and does all the remembering for you, except for one thing — the master password, which grants you access to your password manager.

2. Keep Your Devices Updated

When you install a smart device, they almost always have a mobile app that goes with them. Be sure to install that mobile app and open it at least once a month to see if there are updates for both the app and the device itself. Gadget updates take care of a lot of problems, but their most important application might be security. When disasters strike, they usually tend to hit hardware that’s running outdated software. To prevent this, manufacturers will regularly roll out crucial patches that protect your laptop, phone, and other smart devices from the latest threats. However, these updates won’t install without your permission.
Updates also tackle a host of bugs and performance issues. If your device suffers from poor battery life, can’t connect to Wi-Fi properly, keeps displaying strange characters on screen, a software patch might sort out the issue. Luckily, developers know the importance of installing updates, so they make the process pretty straightforward. It may be annoying to interrupt your work, but it’s worth taking the time to check for and download the latest software.

3. Two Networks Are Better Than One

When setting up your home wireless internet, most wireless modems give you the option to set up multiple networks. Setting up a second network allows you to separate your home’s digital assets. By doing so, you can put everything valuable on one network, such as your computers, phones, and any important data. On the other network, you can put all of the less secure IoT (internet of things) devices, as well as anything that’s not so important. You could even use this second network for guests, preventing them from introducing threats into your main network. This helps to segment the data in case criminals are able to hack into one of the devices. With new technology developments and the rollout of 5G, loT devices are becoming more and more common in our homes and are only set to expand. We have smart TVs, smart fridges, our own virtual slaves in Alexa and Google Home, as well as a host of other IoT devices in many of our abodes. With two separate networks, you can eliminate the risks of poorly secured IoT devices acting as an opening for your main network. If hackers do find their way into your IoT network, all they’ll find is the other IoT devices, and they won’t be able to work their way onto your computers or phones, nor could they steal or mount ransomware attacks on your important data.

4. Multi-Factor Authentication

Multi-factor authentication is just a fancy way to say something you know and something you have. Multi-factor works by adding an extra layer of security to your account, an additional login step to prevent someone from logging in even if they have access to your password. When you sign into any of your online accounts, the basic level of authentication requires only your password to log in. That’s one step to verify your identity. Multi-factor adds an additional layer or layers that you need to provide before you can get access to your account. For instance, once you enter your username and password, you will be prompted to enter a code (note: no company will ever text you to ask for this code) that is either sent to you via text or from an authenticator app. So, if the scammers are able to phish your username and password, they would also have to steal your phone to successfully login. Some tech companies, banks, or other highly secure enterprises may also require three-pronged authentication to access online accounts but most average users will find two-factor sufficient for securing their personal accounts. Adding multi-factor to all your online accounts is one of the most important steps you can take right now to dramatically improve your online security.

Scammers aren’t going anywhere anytime soon and will continue to search for new and smarter ways to access your device. However, if you follow these tips, you will be far ahead of the curve in protecting your personal devices and information. If the thought of hacking has you tossing and turning at night, you can just turn the phone off, remove the battery and hide it under your pillow for some sweet lithium-ion induced dreams. Or, you can double down on securing (at least your credit union’s) devices with the help of OMNICOMMANDER’s CYBERCOMMANDER. We’ve got your back.