If July 9, 2012 felt a lot like Jan. 1, 2000 to you, you're not alone. In the months leading up to the first day of 2000, computer users around the world learned about Y2K. Y2K was a supposed glitch that would cause potentially catastrophic results when computers attempted to cross over the century mark. Y2K came and went with nothing more than minor problems. On July 9, another scare was supposed to happen. In November 2011, the FBI announced that it had busted a group of Estonian cyberattackers that had infected more than 4 million computers. An estimated 500,000 of those computers were in the United States. Due to the nature of the virus, the FBI had to redirect the virus to another server until it could be uninstalled from infected computers. Any computer with the virus was supposed to be unable to connect to the Internet. July 9 came and went and only a small number of problems were reported.

Although these attacks failed to live up to their epic status, that doesn't mean that future attacks won't cause destruction. One U.K. cybersecurity firm called the amount of cyberattacks "astonishing" after telling the story of one U.K. business that lost more than $1 billion in revenue as a result of one attack. Here's how to prepare and hopefully avoid becoming a victim.

SEE: Identity Theft: How To Avoid It

Your Password
It's understandable that you want your passwords to be easy to remember, but that's putting your computer and possibly your finances at risk. Passwords should be at least eight characters; include a combination of numbers, letters and symbols; and not be words related to you. Instead, use a memory device. Use the first letter of each word and include a date. "Ericka was born in Chicago in 1998." This might make your password "EwbiC1998$" (add a symbol of your choice at the end). One hacker reported that the way he entered most secured websites was by exploiting people's weak passwords.

Keep It Safe
Don't allow others to access your password protected sites without you being present. After he or she does, change your password. Even the most well meaning person can accidentally make you the victim of a cyberattack if his or her computer is infected.

Go Low Tech
If you have a spreadsheet of passwords or other digital files that are highly sensitive, consider keeping them on an old computer not connected to the Internet. If you don't have an extra computer, encrypt the files using one of the many free file encryption tools.

Two Places
Another layer of protection could involve keeping the files in two locations. Copy the encrypted files to a DVD or flash drive and give it to a trusted family member or friend. If your computer is infected by a virus and temporarily unusable, those files are still available to you.

Stay out of Bad Neighborhoods
We know that some actions put us at greater risk of being victims of a crime. The Internet is the same way. Going to hacker sites, viewing adult content or going to sites that you know are scams put you at higher risk for a cyberattack than staying with more trusted sites.

Don't Fall for Pop-up
If an e-mail or pop-up window asks you to enter your username or password, don't do it. Instead, open your browser and go to the site directly. If you're still not convinced, call the company. Reputable companies will never ask you for your login information through an e-mail.

The Bottom Line
If you're worried about your bank or credit card company making you susceptible to cyberattack, it's more likely that your actions will make you a victim. Concentrate on what you can do to protect yourself and your computer. Check your financial accounts regularly to ensure no fraudulent activity has taken place.

SEE: 3 Ways Cybercrime Impacts Business

Related Articles
  1. Professionals

    10 Must Watch Documentaries For Finance Professionals

    Find out about some of the best documentaries that finance professionals can watch to gain a better understanding of their industry.
  2. Savings

    Is It Safe to Send Money Through Facebook?

    Learn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
  3. Investing

    How Shackling Offshore Banks Will Impact You

    FATCA regulations have cast a wide net on offshore banking activities, and many innocent account holders might get caught in its tangle.
  4. Investing Basics

    Toshiba's Accounting Scandal: How It Happened

    Learn how Toshiba's corporate culture and lax internal controls led to an accounting scandal that ended with the resignation of the company's CEO.
  5. Professionals

    Is Your Financial Advisor Looking Out for You?

    Financial advisors sometimes aren't looking out for clients' best interests. Regulators are scrutinizing their practices; investors should too.
  6. Professionals

    Are You Sure You Aren't Ponzi Scheme-Susceptible?

    Anyone can be a victim of a Ponzi scheme — even the most financially literate. Here's how to avoid the next Madoff.
  7. Professionals

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  8. Professionals

    Tips for Protecting Clients from Scammers

    Predators now have more access to vulnerable clients than ever before; advisors should communicate with clients to better spot potential scams.
  9. Investing News

    Why FIFA Can't Give the 2022 World Cup to Qatar

    Learn about the high price tag for the 2022 World Cup in Qatar, along with allegations of human rights abuses and bribery scandals in the bidding process.
  10. Investing Basics

    Explaining Insider Trading

    While often associated with illegal activity, insider trading actually encompasses both illegal and legal trading of securities.
  1. What are some high-profile examples of wash trading schemes?

    In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
  2. What are examples of inherent risk?

    Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
  3. What is the difference between wash trading and insider trading?

    Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
  4. What impact did the Sarbanes-Oxley Act have on corporate governance in the United ...

    After a prolonged period of corporate scandals involving large public companies from 2000 to 2002, the Sarbanes-Oxley Act ... Read Full Answer >>
  5. Who are the most famous people convicted of insider trading?

    In finance, insider trading refers to the buying and selling of security by a person who has access to material non-public ... Read Full Answer >>
  6. What's the difference between insider trading and insider information?

    Insider information is the knowledge of nonpublic material about a publicly traded company that may affect the stock's price. ... Read Full Answer >>

You May Also Like

Hot Definitions
  1. Term Deposit

    A deposit held at a financial institution that has a fixed term, and guarantees return of principal.
  2. Zero-Sum Game

    A situation in which one person’s gain is equivalent to another’s loss, so that the net change in wealth or benefit is zero. ...
  3. Capitalization Rate

    The rate of return on a real estate investment property based on the income that the property is expected to generate.
  4. Gross Profit

    A company's total revenue (equivalent to total sales) minus the cost of goods sold. Gross profit is the profit a company ...
  5. Revenue

    The amount of money that a company actually receives during a specific period, including discounts and deductions for returned ...
  6. Normal Profit

    An economic condition occurring when the difference between a firm’s total revenue and total cost is equal to zero.
Trading Center
You are using adblocking software

Want access to all of Investopedia? Add us to your “whitelist”
so you'll never miss a feature!