Locations|Careers|Contact Us|Why Us
Enroll Now Learn more
October is Cyber Security Awareness Month. Created by the United States president at the time, George W Bush, it was designed to raise awareness to the importance of cyber security both for normal computer users and for corporate computer users. Estimates place the losses to cybercrime for 2015 at $3 trillion dollars and that it will increase by 15% each year. To help combat cybercrime, the Cybersecurity & Infrastructure Security Agency (CISA) recommends four easy steps to staying safe online.
Passwords like “password1”, “123456”, “p4ssw0rd”, “Computer” are all easy to crack. The recommended password scheme uses the following:
You may also utilize a password manager to help you organize and securely store your passwords. Some will even monitor if you accidentally used the same password more than once.
Utilize Multi Factor Authentication (MFA)
There can be a bit of confusion here as Two Factor Authentication (2FA) is also available, and some people don’t understand the difference. Both add security by requiring two separate authentication methods or factors.
2FA – Uses password and access to Short Message Service (SMS). A code will be sent via SMS which is entered by the user for login.
MFA – Uses password and access to a digital device-specific token or key fob. Instead of receiving an SMS message, a code is generated by the device that is used for login. An example would be a smart phone with an authenticator app installed and linked to the account. The code changes every 30 seconds or so. Such apps can be Microsoft Authenticator, Google Authenticator, LastPass Authenticator, Secure Signin, or Authy (other such apps are available).
It is generally accepted that MFA is more secure than 2FA and some businesses are required to utilize MFA if they want to procure cyber insurance.
Recognize & Report Phishing
Phishing (pronounced “fishing”) is used to describe methods of obtaining information surreptitiously that can be used to either access accounts or to build a profile used to trick unwary support staff that they are someone else. This can be a phone call that will ask you to provide account information, an email that tricks you into entering login credentials on a fake website, or any other method of gathering personal information. This is why people need to be on their guard when responding. Always ask yourself:
But vigilance is not enough. Vigilance will guard the individual, but only the individual. The reporting of phishing attempts is vital, especially in the corporate world. Putting a red flag on sketchy communications can warn your coworkers so they also do not fall for cyber trickery.
Software updates are posted regularly. Some provide additional functionality or bug fixes, but they also provide security fixes. That is, the respective software companies are constantly testing their software to make sure any security issues are resolved. But they only help if you install them. Always keep up with updates to your operating system, applications, and phone software. And especially keep up to date with antivirus software.
In conclusion, a little effort in vigilance will go a long way in protecting you and everyone else. Be careful out there.
Want to know more about cyber security? Here are some places to start.
Cybersecurity Awareness Month | CISA
What is Cybersecurity? | IBM
What Is Cybersecurity? | Microsoft Security
20 types of phishing attacks + phishing examples - Norton
We are providing you this link for your convenience, but do not endorse or control the content of the third-party website. We recommend that you review and understand their privacy and security policies.
Share This Article
As Washtenaw County's #1 SBA 7a lender, we know the right way to do SBA Loans.
With Bank Michigan's home mortgage options, becoming a homeowner may be closer than you might think.
Providing select financing options for those operating in the CRB (cannabis-related business) industry.
Keep up with what's happening at Bank Michigan by spending some time on our Blog.