If July 9, 2012 felt a lot like Jan. 1, 2000 to you, you're not alone. In the months leading up to the first day of 2000, computer users around the world learned about Y2K. Y2K was a supposed glitch that would cause potentially catastrophic results when computers attempted to cross over the century mark. Y2K came and went with nothing more than minor problems. On July 9, another scare was supposed to happen. In November 2011, the FBI announced that it had busted a group of Estonian cyberattackers that had infected more than 4 million computers. An estimated 500,000 of those computers were in the United States. Due to the nature of the virus, the FBI had to redirect the virus to another server until it could be uninstalled from infected computers. Any computer with the virus was supposed to be unable to connect to the Internet. July 9 came and went and only a small number of problems were reported.
Although these attacks failed to live up to their epic status, that doesn't mean that future attacks won't cause destruction. One U.K. cybersecurity firm called the amount of cyberattacks "astonishing" after telling the story of one U.K. business that lost more than $1 billion in revenue as a result of one attack. Here's how to prepare and hopefully avoid becoming a victim.
SEE: Identity Theft: How To Avoid It
It's understandable that you want your passwords to be easy to remember, but that's putting your computer and possibly your finances at risk. Passwords should be at least eight characters; include a combination of numbers, letters and symbols; and not be words related to you. Instead, use a memory device. Use the first letter of each word and include a date. "Ericka was born in Chicago in 1998." This might make your password "EwbiC1998$" (add a symbol of your choice at the end). One hacker reported that the way he entered most secured websites was by exploiting people's weak passwords.
Keep It Safe
Don't allow others to access your password protected sites without you being present. After he or she does, change your password. Even the most well meaning person can accidentally make you the victim of a cyberattack if his or her computer is infected.
Go Low Tech
If you have a spreadsheet of passwords or other digital files that are highly sensitive, consider keeping them on an old computer not connected to the Internet. If you don't have an extra computer, encrypt the files using one of the many free file encryption tools.
Another layer of protection could involve keeping the files in two locations. Copy the encrypted files to a DVD or flash drive and give it to a trusted family member or friend. If your computer is infected by a virus and temporarily unusable, those files are still available to you.
Stay out of Bad Neighborhoods
We know that some actions put us at greater risk of being victims of a crime. The Internet is the same way. Going to hacker sites, viewing adult content or going to sites that you know are scams put you at higher risk for a cyberattack than staying with more trusted sites.
Don't Fall for Pop-up
If an e-mail or pop-up window asks you to enter your username or password, don't do it. Instead, open your browser and go to the site directly. If you're still not convinced, call the company. Reputable companies will never ask you for your login information through an e-mail.
The Bottom Line
If you're worried about your bank or credit card company making you susceptible to cyberattack, it's more likely that your actions will make you a victim. Concentrate on what you can do to protect yourself and your computer. Check your financial accounts regularly to ensure no fraudulent activity has taken place.
SEE: 3 Ways Cybercrime Impacts Business
ProfessionalsFind out about some of the best documentaries that finance professionals can watch to gain a better understanding of their industry.
SavingsLearn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
InvestingFATCA regulations have cast a wide net on offshore banking activities, and many innocent account holders might get caught in its tangle.
Investing BasicsLearn how Toshiba's corporate culture and lax internal controls led to an accounting scandal that ended with the resignation of the company's CEO.
ProfessionalsFinancial advisors sometimes aren't looking out for clients' best interests. Regulators are scrutinizing their practices; investors should too.
ProfessionalsAnyone can be a victim of a Ponzi scheme — even the most financially literate. Here's how to avoid the next Madoff.
ProfessionalsThe digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
ProfessionalsPredators now have more access to vulnerable clients than ever before; advisors should communicate with clients to better spot potential scams.
Investing NewsLearn about the high price tag for the 2022 World Cup in Qatar, along with allegations of human rights abuses and bribery scandals in the bidding process.
Investing BasicsWhile often associated with illegal activity, insider trading actually encompasses both illegal and legal trading of securities.
In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
After a prolonged period of corporate scandals involving large public companies from 2000 to 2002, the Sarbanes-Oxley Act ... Read Full Answer >>
In finance, insider trading refers to the buying and selling of security by a person who has access to material non-public ... Read Full Answer >>
Insider information is the knowledge of nonpublic material about a publicly traded company that may affect the stock's price. ... Read Full Answer >>