8

Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:
Page 2: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

1

Table of Contents

VIRTUAL SECURITY ONLINE PROTECTION

Logins and Passwords .................................................................................................................................................................................................. 4 Cyber Attacks ................................................................................................................................................................................................................. 8 Public Hotspots, Spoofing, Spying and MAC Identification ............................................................................................................................ 10

EMAIL SECURITY

Email Security, Spoofing, Phishing and Fake Links .......................................................................................................................................... 13

CLOUD COMPUTING

Drop Box, Data Storage, and iCloud ...................................................................................................................................................................... 15

SOCIAL MEDIA

Facebook, LinkedIn, and Twitter ............................................................................................................................................................................ 17

PHYSICAL SECURITY

HOME SECURITY Home Monitoring Devices ........................................................................................................................................................................................ 19 Low-Tech Security Solutions ................................................................................................................................................................................... 21

COMPUTER PROTECTION

Viruses and Malware .................................................................................................................................................................................................. 23 Hardware and Electronic Devices ........................................................................................................................................................................... 25 Encryption and Firewalls .......................................................................................................................................................................................... 27

MOBILE DEVICES

Mobile Phones .............................................................................................................................................................................................................. 29 Mobile Apps .................................................................................................................................................................................................................. 31

ATM, CREDIT, AND DEBIT CARD THEFT

Skimmers and Online Shopping ............................................................................................................................................................................... 33

PERSONAL SECURITY

IDENTITY THEFT Preventing Identity Theft ......................................................................................................................................................................................... 35 Recovering from Identity Theft ............................................................................................................................................................................... 38

TRAVEL SECURITY

Travel Security Measures .......................................................................................................................................................................................... 40

PERSONAL PROTECTION Kidnapping..................................................................................................................................................................................................................... 42 Dating Apps and Websites ........................................................................................................................................................................................ 44

SCAMS Scams Targeting Seniors ........................................................................................................................................................................................... 46

Page 3: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

2

Page 4: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

3

About Efficient Wealth Management

Efficient Wealth Management is a boutique wealth management practice founded in 2005 that offers personal,

private and exclusive concierge-level service for successful individuals. We are a fee-only firm, never

accepting commissions or other transaction-oriented compensation. We limit our focus to select clients for

whom we believe we can have a tremendous impact.

Using a consultative process, we work in conjunction with a team of experts to help our clients build and

preserve their wealth, plan for retirement, mitigate their income taxes, take care of their heirs, and protect

their assets.

If you feel that our wealth management process might be a fit for you, please contact us at 281-528-1200. We

will set up a discovery meeting to explore whether we should work together. If we find that we are not the

right firm for you, we will do our best to refer you to a more appropriate advisor.

To learn more, please visit our website at www.efficientwealthmanagement.com.

Intelligent Wealth Protection

Here at EWM we absolutely love helping people improve the quality of their lives. We put together the

Intelligent Wealth Protection video series and workbook to inform our clients of the many 21st century

threats. In the series of 20 short videos we cover Virtual Security, Physical Security, and Personal Security.

In this workbook we provide checklists and resources that we recommend to protect you and the people you

care about from the threats addressed in the videos.

Please see below the link to the Intelligent Wealth Protection landing page. Please feel free to share the

landing page with your friends and loved ones.

https://efficientwealthmanagement.com/iwp/

The QR Code above will send you directly to your IWP landing page which lists the 20 videos discussed in this workbook.

We recommend you download the application “Scan” to your smart devices as your QR Code and Barcode Reader, available through iTunes.

Page 5: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

4

Online Protection

Video 1: Logins and Passwords

One of the many challenges people struggle with is keeping up with various logins and passwords used. Today, there are logins and websites for practically everything, including various work sites, checking and savings

accounts, investment accounts, and even online shopping sites. The challenge is keeping these logins in a secure location.

Storage of your user names and passwords:

Password managers are a great tool for storing all your passwords encrypted in one place. The concept

is very similar to an encrypted “safe.” Password managers allow you to have complex passwords that

you don’t need to remember. You remember one master password to log in to the password manager.

A good password manager syncs with your desktop computers, tablets, and smartphones.

Storage of the master password:

Memorize your master password. A great trick for generating a great master password is to use the

first letter of a series of words in a sentence or a title to a book. Your master password should be at

least 15 characters long and include letters, numbers, and special characters. You can substitute special

characters and letters, for example, @ ! % $.

We recommend keeping a copy of your master password in a sealed envelope in your safe deposit box

or secure location. The master password should never be written in an unsecure location.

Logins that require you to reset your password every so often:

This is not necessary if you have a password manager, but great for people who have poor password

discipline.

Page 6: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

5

Online Protection

What happens if I’m indisposed and my family needs access?

For estate planning purposes, your heirs need to be able to obtain your master password after you die.

This will be very beneficial for your family and heirs.

Put some form of Power of Attorney language in your estate plan or some other document that

enables people to access electronic records.

Keep your password manager “master password” in a bank safe, a vault, or a safe in the house someone

can access in the event you die, you’re in a coma, you’re inaccessible, etc.

Make sure you let someone know where the password is and that he or she knows how to access it.

Page 7: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

6

Online Protection

Checklist

Never use the same password more than once. If one password is stolen, hackers will start plugging it

in and testing it or other sites.

Make all passwords a minimum of eight characters, although longer is much better.

Use all types of keys on the keyboard, including letters, numbers, uppercase, lowercase, and special

characters, because doing so significantly increases the difficulty of guessing your password.

Make your passwords random. Do not include information that is otherwise available, like your name,

spouse’s name, pet’s name, or date of birth.

Check the strength of your passwords at www.microsoft.com/security/pc-security/password-

checker. aspx. (Password managers also have this functionality.)

Use unique passwords for each account and website. By doing so, you will remain protected in all your

other online activities when one of your favorite shopping, gaming, or news sites eventually gets

digitally compromised and your password is stolen.

Do not keep a written list of your passwords anywhere near your computer. However, keep a list of

your passwords in a secure off-site location, such as a safe deposit box, so that your family can access it

if you become disabled or die. Make sure they know where this information is located.

Consider using a password management program to generate and store your passwords securely. In

this case, store this master password in a secure off-site location.

Page 8: Table of Contents · A good password manager syncs with your desktop computers, tablets, and smartphones. Storage of the master password:

7

Online Protection

Resources

Roboform.com (Personal and Business)

Top-rated password manager

Dual authentication

Multifactor password options

Cloudentr.com (Business)

Two-factor authentication

Granular access control

Single sign-on

Secure file sharing

Lastpass.com (Personal)

Add another layer of security with the Yubico key

Single sign-on

Add, manage, and remove users in real time

Secure notes for digital recordkeeping

1Password: https://agilebits.com (Personal)

Simple and convenient security

21st-century digital wallet, no paper required

Easy, secure sharing with family or team members

Click here to request your complimentary, full version of

Intelligent Wealth Protection