Tag: network security

How to Protect Yourself Against Credit Card Fraud

Credit cards chained up with padlockCredit card fraud can cost you a lot of time and money. I know this is a big surprise, right? But how much can it actually cost you? A LOT. In fact, it is estimated that credit card fraud costs consumers and businesses $190 billion every year. Although these tips are basic and straightforward, here are a few necessary and essential steps to protect yourself against the headaches of stolen credit card information and fraud.

Physical Security

Basic, right? This is the easiest way to have your credit card information stolen and for someone to then use it to make fraudulent purchases: physical theft of your card. Make sure you keep track of your cards and secure them properly. All too often we get replacement cards in the mail, toss them in a drawer, glove box, or other unsecured location, and then forget about them. Keeping track of all of your cards can be challenging these days, but doing so could not be any more important in an increasingly cash-less society. So keep any eye on every single card you own, even the ones you don’t use. Shred the ones you have no use for, and secure the ones you use every once in awhile, and keep a watchful eye on the ones you use regularly.

Only Use Your Card On Trustworthy Sites

HTTPSNo doubt you’re rolling your eyes at this recommendation. But consider this: it is estimated that consumers lose approximately $29 million every quarter on fraudulent websites. $29 million! So if you’re buying something online (aren’t we all?), make sure you’re buying from a site you trust. There are a few special security measures of note. First and foremost, make sure the site you’re buying from is the site you think it is; you don’t want to enter all of your personal data on a convincing mock-up. Be sure to double-check the URL and only access the site through a clean link. Never enter your data on a site you reached via a link from an unfamiliar or redirected source.

And make sure you watch to make sure you’re connected via HTTPS when transferring data, to avoid having the information stolen as it passes to the site. You can confirm this by looking up by the address bar on your browser; it should show a lock symbol, say Secure, or simply note ‘HTTPS’ if you’re connected safely.

Dispose of Documents Carefully

Anything with your credit card number on it–or any personal identifying information for that matter–needs to be thoroughly destroyed. That means shredding, burning, or something equally destructive. You don’t want to have your credit card information found by someone digging through your trash—it’s a more popular approach to identity theft than you might realize. So suck it up and go buy a decent shredder for $25. Or dig one out of a dumpster. Unless you’re living on another planet, there’s no reason not to use a shredder every single day in order to keep your financial information safe. As the old saying goes, “You should ‘Enron’ as much stuff as possible to stay safe these days.” Shred it, burn it, or destroy it. Whatever it takes.

Upgrade to a Chip Card

Credit Card With Gold ChipCredit cards with microchips are inherently safer to use than those without; these have been in use in Europe for over a decade. If you haven’t already upgraded to a chip card, it’s time to look into your options; many banks and credit card companies have already made the leap. Some complain that chips take longer to process while checking out at stores in the U.S., but studies show that transactions take only 1 second longer, or less. Either way, the added security that chips offer far outweigh having to wait in line a few moments longer at Target. If your bank still hasn’t yet made the switch to the chip, call your old-school savings and loan and tell them to get on it.

Stay Alert

Credit card skimmer

Credit card skimmer

There are a few credit card fraud schemes that can slip right past you if you’re not looking for them, but they will become pretty obvious as long as you stay alert to anything usual. This includes watching for card skimmers, special reading devices installed on gas pumps and ATM’s that steal your data. There has been a significant rise in the use of card skimmers in the U.S. over the last few years, and this trend will likely continue. Every time you stop at the gas station to fill your tank or at the ATM to grab some cash, take a few moments to double check the card swiping device.  You’ll also want to watch for other simple scams, such as getting you to sign a credit card receipt without a verified amount on it.

Report Lost Cards and Suspicious Activity Immediately

Report LostSad but true, but sometimes you can’t completely avoid exposure to fraud. If you can’t find your credit card, if you see a purchase you don’t remember, or if anything suspicious occurs with your card, follow it up as soon as possible. Yes, calling credit card companies is arguably the worst task on earth, but lost or missing cards should be reported to the issuer immediately, without hesitation. For suspicious charges, be sure to investigate and contest any charges if necessary, and then (possibly) request a new card. The sooner you contact your credit card company (and hold on the line for an hour), the sooner you will have suspicious and fraudulent charges resolved.


Adam Quirk, MBA & MCJ

Adam Quirk, MBA & MCJ

Adam Quirk, MCJ & MBA, has extensive experience in the criminal justice field, as well as advanced degrees in Criminal Justice (MCJ) and Business Administration (MBA).

Hacked: How To Spot A Home Network Security Breach

401044-securityThe vast majority of homes in the U.S. have at least one wi-fi network. Thankfully, setting up these in-home networks can be a fairly easy task. However, keeping them safe requires cybersecurity awareness and vigilance. Living in an interconnected world has made it easy for people to go about their day-to-day tasks. Sadly, the average internet user can be a target of identity thieves and hackers online. The good news is, you don’t need to be a Cybersecurity expert to keep your home wireless network safe. Here are some ways to detect if a home network has been hacked:

Computers in the network receive the same virus and anti-virus notifications.

Home network security breaches can easily begin with one infected desktop computer, laptop or tablet.   A cyber hacking attack typically starts with one computer.   When one of the devices, typically PCs, have a virus, it can spread easily to the other devices connected to the network.  Using infected USBs and hard drives can also contribute to the damage. Make sure to protect all of your devices with the latest anti-virus software, and be sure to install updates on a regular basis. Better yet, set the software to automatically update in order to ensure the best protection. You can download free anti-virus programs like Avast that will provide excellent protection for your computers.

Computers automatically download unwanted programs and browsers.

Adam QuirkBe careful when clicking links in web pages and emails.  Avoid clicking promotions for apps before clicking on them to download.  Unfortunately, some of the so-called antivirus programs do more harm than good by automatically downloading unwanted browsers and dialog boxes that can lead to stolen information. Rather thank clicking through every box when installing programs or applications on your devices, take a close look at what you’re actually downloading to be sure there are no unwanted applications or programs being installed.

Users receive suspicious e-mails.

When a home network has been hacked, important information such as e-mail addresses can be used to steal further from a user.  Emails from a friend’s unused address or from seemingly legit organizations can be a phishing scam.  When people from one network get the same kind of e-mails, their security might have been compromised.

The wi-fi connection is unusually slow and there are suddenly unknown computers connected to the network.

Adam QuirkIt’s easy to leech off a neighbor’s wi-fi connection especially if is not properly secured.  One of the tell-tale signs of a home network breach is if there are suddenly more computers connected to the network. For some, the hacking goes as far as controlling mouse clicks and movements and copying files from the users’ computers.

To prevent hacking attacks, it’s important to regularly check network your security. Passwords must be regularly changed and important information should always be backed up in the cloud or in another hard drive.  Also, users should only download files and programs from legit sources to prevent falling prey to phishing scams.

One of the most common precautions but usually overlooked step when it comes to home network security is to set up a firewall and encrypt the connection.  Others just set up their home Wi-Fi without even putting a password on their connection, making them an easy target.  Aside from these steps, filtering MAC addresses will also help in preventing unknown computers join the network.