Cybersecurity Best Practices

As the world around us continues to become more and more digitized, it is important we are aware of the many ways in which our personal information can be compromised. Hackers and spammers can obtain much of our personal information these days without much effort. By using computers, digital criminals can crack your passwords and even disguise themselves as someone you trust.

EMAIL: Please be aware, Armor will never ask you to send information such as your birth date, social security number, or account numbers over email. If you receive an email requesting such information, it is always best to not click any links or open attachments contained within the email, but instead to call the company which you believe is requesting said information and confirm the email is real. Beware of emails telling you a password has been changed or needs to be changed, as often times this is the easiest way for these individuals to get your personal information. The easiest way to double-check whether an email is being sent from a valid source is to hover over the name of the individual who has sent the email. By hovering over their name, you will be able to see the actual email address the message was sent from. Be sure to carefully check the address as attackers will often use spoof email addresses that resemble the real email address, but insert extra or replace characters, numbers, and punctuation.

PHONE: You’ve likely received many spam phone calls claiming to be the IRS, Social Security, the Department of Education, Google, etc. And doesn’t it feel like the calls happen more and more frequently?

With computers, the spoof callers are able to impersonate a real phone number, usually using the same area code as your own, in an attempt to get you to answer the phone. Furthermore, they’re able to send out thousands of these types of calls at a time. It’s best to not answer calls from numbers you don’t recognize and if you do, never provide any personal identifying information. None of the previously mentioned companies or organizations will ever call you should they need to contact you. Also note, you can receive spam text messages containing attachments and links that can be compromising.

For our part, Armor has engaged with third-party cyber security and information technology consultants in an effort to do everything possible to protect your data and guard against hackers. Some of the relevant procedures and policies we have implemented at Armor include:

  • Quarterly Data Security Training
  • Continuous Internal Phishing Training
  • Network Vulnerability Testing
  • Regular Vetting of our Software Vendors’ Security Practices
  • Annual Breach Records Search
  • Virtual Private Network for Secure Out-of-Office Access
  • Secure Online Portals for Transmitting Sensitive Information
  • Strong Password Requirements
  • Verbal Confirmation of Wire Requests

Please let us know if you have any questions about our cyber security practices, or if you are concerned you may have been the recipient of a suspicious email or phone call related to your financial accounts.

 

Nothing contained in this publication is intended to constitute legal, tax, securities or investment advice, nor an opinion concerning the appropriateness of any investment, nor a solicitation of any type and does not guarantee future results. The information contained in this publication should not be acted upon without specific legal, tax and investment advice from a licensed professional. Past results are not indicative of future performance.