Search
  • roshanloungani

10 Cybersecurity Tactics to Wall Off Your Data

RL052 - Retirement Lifestyle: 10 Cybersecurity Tactics to Wall Off Your Data


On this episode of the Retirement Lifestyle Show, Roshan Loungani and Adrian Nicholson talk about cybersecurity and data protection. They discuss why it's essential to be safe online, tactics used by scammers to steal your information, and how to protect yourself from potential attacks. The good news is, there are simple steps that you can incorporate into the online space that will protect you from potential threats, and we're here to guide you throughout the process.


[06:20] Cybersecurity and Data Protection

[09:58] Creating Strong Passwords

[12:01] Having Two-Step Verification Logins

[14:50] Think Before You Act

[20:30] Adjusting Your Privacy Settings on Social Media

[22:15] Up to date Security Software

[30:40] The Importance of Using Default Firewall Security on Your Computer

[34:12] Security Software Scams

[35:43] Lottery Scams

[37:10] Catfishing Scams


See full Show Notes below


Links and References

The Ultimate Internet Safety Guide for Seniors

10 Cybersecurity Best Practices For Older Adults


Roshan can be reached at roshan.loungani@aretewealth.com or at 202-536-4468.


Erik can be reached at erik.olson@aretewealth.com or 815-940-4652.


Adrian can be reached at adrian.nicholson@aretewealth.com or at 703-915-8905.

Listen to the whole episode on our website here: https://www.retirewithroshan.com/podcast


OR for links to your favorite platform like Spotify, iTunes and so on go here:

https://anchor.fm/roshan-a-loungani/episodes/RL052---Retirement-Lifestyle-10-Cybersecurity-Tactics-to-Wall-Off-Your-Data-eqhkle


Select episodes, like this one can be found on YouTube:

https://www.youtube.com/channel/UC0ZZPM3xk6onXNpb1ceAkCg






Follow Us At: https://www.retirewithroshan.com https://youtu.be/hKVzI87v0tA https://twitter.com/RoshanLoungani https://www.linkedin.com/in/roshanloungani/ https://www.facebook.com/retirewithroshan/ https://www.linkedin.com/in/financialerik/ https://www.linkedin.com/in/adrian-nicholson-74b82b13b/ #retirementlifestylepodcast #fire #podcast #FI #Retire #retirewithroshan


Cybersecurity and Data Protection

The past decade or so has witnessed an increase in the number of things we can do online. And with the global pandemic pushing us into the virtual world, cybersecurity is a topic that we felt is crucial in current times. Cybersecurity and data protection is simply keeping your private information protected and safe from damage and theft. According to recent research, most organizations have or will be faced with a cyber-attack throughout their existence. The fact that these organizations pump millions of dollars into boosting their security protocols, yet they still face threats is worrying because imagine what these hackers can do to an individual with limited resources. The good news is, there are simple steps that you can incorporate into the online space that will protect you from potential threats, and we're here to guide you throughout the entire process.

Create Passwords and Make Them Strong

The most basic way to protect yourself from cyberattacks is by having passwords. Even with face recognition software and fingerprint scanners on most of our devices, most people are still reluctant to sign up for them. But, what happens when you lose that device, say your computer, and someone gains access? Remember, your machine doesn't have a password, and most browsers have a password autosave feature, which, theoretically, means someone can access all your private information. That said, always ensure your devices have passwords that are at least 12 characters long and include numbers, letters, and symbols. The other thing is being cautious when using public computers or public networks such as your library or coffee shop WiFi.

Think Before You Act

The common and most notable trick that most scammers use is creating a sense of urgency through emails claiming a problem with your bank account or taxes. Once you provide them with your information, what happens next is that they use your information to either steal from you or target your network. How then do you differentiate authentic from fake emails when they all look all so similar. First, most financial institutions use verified emails and rarely ask for your information via email. Secondly, if you're unsure whether the source can be trusted, always seek a second opinion, even if it means calling your bank.

Adjust Your Privacy Settings

As earlier mentioned, hackers can be quite convincing when reaching out asking for your personal information. They do this by monitoring your digital footprint, a good example being how you use your social media. Let's say you were on holiday in Rome and posted on social media how wonderful Rome is and tagged the hotel that accommodated you. When sending you an email, these scammers will mention everything you did in Rome, making them sound legit. So, before posting anything on social media, make sure you filter out people that can view your content. Again, if an email looks weird, delete it. If it's important, your bank should call you or contact you via mail.

Remember to Log Out

Forgetting to log out, especially from public devices, has been in existence ever since computers were first invented. At first, random people would access your account and play a prank on your contact list. Over time, these pranks have transitioned into identity theft and extortions. This, again, goes back to having strong passwords and avoiding public networks and devices unless it's necessary. This ensures that if you fail to log out on your device, the only way someone can access your information is if they get a hold of your device. But then again, your device will have a password, which is a guaranteed safety feature.

Security Software Scam

Another common way scammers can access your information is by again, preying on your sense of urgency. Once you visit an untrusted site, you'll see a pop-up that tells you that your computer is at risk and that you should install specific software to eliminate the risk. If you fall into the trap and install the said software, they'll have free access to your personal files and information.

Scammers understand that people can be greedy sometimes and so they'll send you an email claiming that you won a million-dollar lottery that required no participation. The next thing they'll ask you is to provide your bank details or credit card information so that they can disburse the winnings. Here's the thing, there is no way you can possibly win a lottery without participating in one. It just can't happen.

All opinions expressed by podcast hosts and guests are solely their own. While based on information they believe is reliable, neither Arete Wealth nor its affiliates warrant its completeness or accuracy, nor do their opinions reflect the opinion of Arete Wealth. This podcast is for general informational purposes only, and should not be regarded as specific advice or recommendations for any individual. Before making any decisions, consult a professional.



2 views0 comments