Blog   Tagged ‘private’

What you don’t know can scam you: 4 tips to help you be more cyber secure

Posted by

A UMB associate recently shared a story with me about his mother-in-law who joined Facebook to keep up with friends and family. She received a friend request from a widowed, retired serviceman around her age and the two developed a friendship. The gentleman asked if she could send money to help him come for a visit. What she didn’t know was that he was a social engineer‡. Her family and local law enforcement were eventually able to convince her that she had been part of a Facebook romance scam‡, but not before she lost nearly $60,000. Sadly, stories like this are more common‡ than you might imagine, and the threat is real. In this video, you’ll see how phishing scams and social engineering takes shape and what you can do to prevent being lured into one.

Continue Reading

Every year, cyber criminals become more sophisticated and harder to stop. We already know consumers globally lost $158 billion to cybercrime in the past year, and in the United States alone, the figure is nearly $30 billion. As technology continues to change, so does the way criminals try to get your personal information to commit fraud. While we are committed to providing helping customers stay secure year-round, we try to make special notice of it during October’s National Cyber Security Awareness Month (NCSAM)‡.

NCSAM is designed not only to bring online threats to the forefront, but also to help individuals take better care of their online information. So how can you protect yourself, your family and your electronic devices?
NCSAM
Keep a clean machine

  • Links that you have received that are still stored in emails, social media direct messages and other online communications may be used to try and phish your personal data. A compromised email gives access‡ to sent email conversations revealing detailed information on you including  attachments you may have forgotten to delete.  Make a plan to move suspicious message to your Junk Email folder and to check your disable links and warnings feature in your email settings.
  • Did you know memory sticks‡ and other external devices (like phones and tablets) can be corrupted and give your computer what they’ve been infected with? Use antivirus software to scan them too.

Protect your personal information

Get the kids involved – Online gaming

Online gaming can be a fun way for kids to connect with others, but it’s important for them to understand the risks, to know how to handle certain situations. My son was recently the victim of a social engineer while gaming online. He took the bait from someone he thought was a new friend and lost a bunch of virtual currency – that was purchased with real dollars, and while that was disheartening (especially since I thought I’d taught him plenty about social engineering), it could have been even worse. Talk with your kids about:

  • Malicious users posing as “site administrators”
  • Never sharing account names and passwords – which allow the fraudster access to mom or dad’s credit cards
  • Buying fake virtual goods
  • Always using the legitimate site for the game. Never engage in transactions outside of the site.

Know that your mobile devices are targets too

  • Most of your mobile devices (smartphone, wearable technology‡, tablet and even laptop) contain significant information like contact numbers, photos, location and more. It’s important you treat your personal information in these like its valued currency.
  • Connecting to public wifi hotspots‡ that are not secure could be harmful. Avoid using these especially when logging into email or financial accounts.

For more tips you can use to keep your home and office safe online, visit StaySafeOnline.org‡.  In addition, you can visit UMB’s Security and Privacy page to help you stay current on security best practices as well as see how we’re working to protect you.

security-resource-page

Remember, while you can’t prevent every attempt at cyber crime, you can take steps to prevent and respond quickly if it does happen.

 

 

When you click links marked with the “‡” symbol, you will leave UMB’s website and go to websites that are not controlled by or affiliated with UMB. We have provided these links for your convenience. However, we do not endorse or guarantee any products or services you may view on other sites. Other websites may not follow the same privacy policies and security procedures that UMB does, so please review their policies and procedures carefully.


Ms. Flores serves as senior vice president and Chief Information Security Officer, providing oversight of UMB’s information security and privacy programs. She joined UMB in 2010 and more than 15 years of experience in information technology and information security. She attended Kansas State University with a focus on management information systems and is a Certified Information Security Manager (CISM), Certified Information Privacy Professional (CIPP/US) and Certified Information Systems Auditor (CISA).



Leave a Comment

Tagged: , , , , , , , , , , , , , , , , , ,

Join the movement: National Cyber Security Awareness Month

Posted by

In a world where our thirst for computers, smartphones, gadgets and Wi-Fi seems to have no limits, cyber security has become more important than ever. At home, at work and at school, our growing dependence on technology, coupled with increasing threats to our online safety and privacy, demands greater security in our online world.

Continue Reading

At UMB, we’re proud to take strides towards a safer, more secure cyberspace. In doing so, UMB has joined the National Cyber Security Alliance, Anti-Phishing Working Group and Department of Homeland Security in support of National Cyber Security Awareness Month in October. The Stop.Think.Connect. campaign was launched in 2010 as a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. Consider it a neighborhood watch for your computer. However, just like security in your neighborhood, this campaign can only be successful when people get involved.

Through this national campaign, UMB has teamed with public and private sector resources as well as the U.S. federal government to help improve cyber security. According to the Stop.Think.Connect. campaign, they strive to:

  • Increase and reinforce awareness of cyber security, including associated risks and threats, and provide solutions for increasing cyber security.
  • Communicate approaches and strategies for the public to keep themselves, their families and their communities safer online.
  • Engage the public, the private sector, and state and local governments in our nation’s effort to improve cyber security.

Cyber security is a shared responsibility. I invite you to join UMB in the cyber security movement during National Cyber Security Awareness Month. Do your part by visiting umb.com and the Stop.Think.Connect. resource page to learn more about how to protect yourself online and help make cyberspace a safer place for all cyber citizens.

 

When you click links marked with the “‡” symbol, you will leave UMB’s website and go to websites that are not controlled by or affiliated with UMB. We have provided these links for your convenience. However, we do not endorse or guarantee any products or services you may view on other sites. Other websites may not follow the same privacy policies and security procedures that UMB does, so please review their policies and procedures carefully.


Ms. Flores serves as senior vice president and Chief Information Security Officer, providing oversight of UMB’s information security and privacy programs. She joined UMB in 2010 and more than 15 years of experience in information technology and information security. She attended Kansas State University with a focus on management information systems and is a Certified Information Security Manager (CISM), Certified Information Privacy Professional (CIPP/US) and Certified Information Systems Auditor (CISA).



Read One Comment

Tagged: , , , , , , , , , , , , , , , , , , ,