Do you remember the last Wi-Fi-enabled space you visited? With the boom in technology and internet connectivity, it has become commonplace for public locations, such as restaurants, coffee shops, public libraries, mass transportation stations, and personal devices, to offer Wi-Fi. Anyone can access the internet from anywhere, which in turn introduces new cybersecurity risks.
Key Points of This Article
- Rise of Digital Payments and Cybersecurity Risks: The increase in digital payments has heightened the need for cybersecurity measures to protect financial data from cybercriminals.
- Common Hacking Techniques: Hackers use methods such as phishing, smishing, and exploiting mobile applications to access personal and financial information.
- Protecting Your Investment Portfolio: Implementing basic cybersecurity practices, such as monitoring accounts, updating applications, using secure connections, and avoiding public Wi-Fi, can help safeguard your investment portfolio from cyber threats.
According to a McKinsey study, about 53 percent of all payments made in the United States in 2020 were digital, largely due in part to the COVID-19 pandemic. Pandemic or not, we are living in a digital transformation era, where cybercriminals target every industry, from financial services to healthcare. And with most processes digitized, we have stepped into a world of seamless connectivity, one where it makes it easier for cybercriminals to access your financial data, no matter how many risk management buffers are put into place.
Your investment portfolio doesn’t have to fall victim to cybercriminals. We’re going to share some basic cybersecurity practices you can put in place to protect your financial data and investment portfolios. First, let’s dive into exactly how hackers can access your information.
How hackers access your financial portfolio
Phishing
Hackers use phishing to create a sense of urgency via emails that attempt to make you share your important data. Phishing emails appear to have been sent from a well-known organization or any bank or company you might be associated with. Most threats leverage human emotions, such as fear, panic, sense of urgency, etc., to facilitate the effectiveness of phishing campaigns. For example, you could receive an email that claims your ATM card has been blocked and that you need to fill in your bank details for further processing. Another form of phishing involves sending an attachment that, when downloaded, installs malware on your system, leading to further exploits.
Hackers use phishing to create a sense of urgency via emails that attempt to make you share your important data. For more information on how to recognize and avoid phishing scams, check out Federal Trade Commission’s guide on phishing.
Mobile applications exploitation
Beware of the applications that request sensitive personally identifiable information (PII) from you, such as social security number, address, credit card number, etc. Unfortunately, there seems to be a common misconception that every application on the Google Play store or Apple store is safe. Some applications contain malicious code to compromise confidentiality, integrity, availability, and privacy. Cybercriminals often inject malicious code into trusted mobile applications to allow them to capture user credentials for sensitive activities, including financial transactions. Mobile applications are often compromised to access:
✔️ Privileged accounts
✔️ SMS messages
✔️ Camera and microphone
✔️ Contacts list
Beware of the applications that request sensitive personally identifiable information (PII) from you. To learn more about protecting your privacy on mobile apps, visit Norton’s guide on mobile app security.
Smishing
Smishing is another form of phishing—through text or phone calls. Here, hackers attempt to trick you into sharing your private data by creating fake scenarios that mimic real messages that might be sent from a financial organization or bank. First, the hackers gain your trust to obtain your data, and later they try to gain access to your passwords or one-time passwords (OTPs) to access your accounts.
Smishing is another form of phishing—through text or phone calls. For further reading on smishing and how to protect yourself, visit Kaspersky’s article on smishing.
Insecure networks
Whenever a device is connected to an insecure network, such activity increases the risk of data theft because any hacker nearby could capture the data traffic flowing through said device. When valuable data is stolen, such as personally identifiable information (PII), cybercriminals immediately sell said data on the dark web to other malicious actors for profit. As a result, insecure networks are often used to lure unsuspecting individuals.
Whenever a device is connected to an insecure network, it increases the risk of data theft. To learn about securing your network, read Cisco’s guide on network security.
Malware
Malware is any malicious software that, once installed on your system, can perform functions like stealing or wiping out sensitive data from your device. There are several types of malware, such as viruses, trojans, spyware, etc. The worst cases of malware hacking occur in systems that have older versions of the operating system and no antivirus protection.
Investors must recognize that their digital financial footprint is a goldmine for cybercriminals. Vigilance in cybersecurity practices, like avoiding public Wi-Fi for financial transactions and using strong, unique passwords, is as crucial as the investment decisions themselves.
– Kurt Sanger Cybersecurity Expert
Protecting your investment portfolio
With the rapidly changing environment, there isn’t one standard way to protect critical assets, such as an investment portfolio. However, there are some basic security best practices that you can implement to protect your investment portfolio:
✔️ Regularly monitor your investment account statement and trade confirmations. This includes emails requesting your financial information, which can help you quickly detect any suspicious events.
✔️ Frequently update the applications hosting your investment portfolio. As financial investment firms leverage mobile applications to facilitate business operations, specific software weaknesses are discovered on trading platforms. Whenever these software weaknesses are discovered, most organizations release quick security patches and updates. Therefore, make sure you update your applications and software as soon as they are released.
✔️ Use automated “passwordless” managers and password generators. As the cyber threat landscape evolves, avoid sharing your investment account credentials with unverified third parties or writing them down. Today’s hackers are sophisticated when it comes to guessing access credentials, so it’s wise to leverage technology to create strong account passwords and keep them protected.
✔️ Avoid using public Wi-Fi to access your online brokerage account. Private, secure internet connections are the safest for accessing brokerage or investment accounts, especially when two-step verification is enabled on these accounts. Typically, a one-time password (OTP) is required before you can access their account, which can also notify you if an unauthorized entity is attempting to access your investment account. If you do need to access your account in public, consider an approved Virtual Private Network (VPN)—this creates a secure tunnel around all browsing activities from your IP address.
As digital transformation continues to transform the financial services and investing industries, it’s more important than ever before to take the necessary cybersecurity steps to protect your investment accounts from hackers. Consider implementing basic security practices into your routine to keep your financial data protected and secured.
Need help getting started with cybersecurity? Let Batten help. Take our quiz for personalized security solutions today.
Prepare today for peace of mind tomorrow.
Get occasional tips about keeping your family and home safe — delivered to your inbox.
Sources Used for this Article:
- https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/the-2020-mckinsey-global-payments-report
- https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
- https://us.norton.com/internetsecurity-how-to-mobile-app-security.html
- https://www.kaspersky.com/resource-center/definitions/smishing
- https://www.cisco.com/c/en/us/products/security/what-is-network-security.html