Cyber Security

In acknowledgment of Cyber Security Day, let’s talk about the types of cyber crimes, cyber risks, and prevention.

This year, studies conducted by a research group called Nielson showed that on average, Americans spend nearly 11 hours a day using electronics. Whether it be a computer, tablet, or a cell-phone, the average screen-time for Americans is almost HALF of our day. How often are you using your electronics?

The use of computers became more common in America in the 1980s. Since then, the rate of cyber crimes have continued to increase dramatically–especially due to the evolvement of technology and the availability of the Internet.

What are a few types of cybercrime?

Identity theft: impersonating another person using their stolen information

Computer fraud: using computer systems to deceive others for personal gain

Privacy violation: includes exposing others’ personal information such as phone numbers and addresses

Electronic funds transfer: illegal transfers of money via unauthorized access to online banking

What are the top cyber risks?           

  1. Human error. It’s happened to all of us. We misplace our electronic devices, such as our laptops and smartphones. Also, they can get stolen if we don’t keep track of them. These devices contain our sensitive, personal information.
  2. Hacker. Hackers are able to pinpoint weaknesses in computer systems or networks and take advantage of them to gain access. Hackers use computers as tools to commit crimes involving fraud, data theft, and invasion of privacy.
  3. “Phish”. To phish means for someone to pose as a trustworthy service in attempt to get your personal information. Phishers will email you pretending to be a company, such as your bank, with a link to a website that looks legitimate and similar to the actual website. The link will be asking you to input your personal information.
  4. Data leakage. Misplacing your electronics, such as your laptop, smartphone, or USB storage, can be a risk for the sharing of your personal information if the wrong person get their hands on it.
  5. Ransomware. This is a form of malicious software, called malware, that sometimes appears in the form of an email. It will encrypt your hard drive and lock you out of the system, while hackers are threatening to release important data until you pay money to “unlock” it.

            How can I use cyber security to prevent a cyber crime against me? 

  • Use security software. Antivirus software will scan your computer, detecting unsafe database, and delete it from your computer.
  • Watch the websites you are visiting. A URL that does not begin with “https” poses a threat to your device. In the slot where you type your website URL in, there will be a locked padlock that tells you the website you are viewing is secure.
  • Create strong passwords. One of the easiest ways to prevent your information from being stolen is to use long passwords. Create your password with special characters (!?-.#*), and be clever with where you use uppercase letters. This makes it difficult for hackers to guess your password.
    • Pro tip: Do not use the same password for every log-in. If you do, a hacker that guesses your password can log-in as you to any site you have an account on.
  • Be cautious when it comes to online banking. Consistently change your passwords for your online bank accounts. Monitor the account nearly everyday to ensure there’s no suspicious activity going on. Do not send any private information via email.
  • Be careful what you share on your social media accounts.

Today is Cyber Security Day. Acknowledge the day by strengthening your passwords and updating your anti-virus software on your computer. It’s important to be aware of the risks that are involved with using your electronic devices.

By: KayLynn P.


Do you have questions about your insurance? Find an insurance agent near you with our Agent Finder

Buzz Your
Insurance Agent

Search for a local agent with our agent finder map.

Agent Finder

Search All Blogs

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt

Buzz Your
Insurance Agent

Search for a local agent with our agent finder map.

Agent Finder

Want to learn more about
our blog writer?

Read more about KayLynn's background.

Search All Blogs

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt

Life Insurance Myths Busted: Unveiling the Simple Truths Behind Financial Security

Considering life insurance but confused by the myths? We clear the air on common misconceptions and show you how to get simple, affordable coverage.

The Farewell Financial: Planning a Peaceful Goodbye

Beyond Goodbyes: A Guide to Navigating Funeral Costs and Life Insurance

Why Life Insurance Matters for Businesses

Death and the Business Owner: How Life Insurance Can Secure Your Legacy

Beyond the Grave: Burial Insurance vs. Life Insurance Explained

Don’t Be Buried by Confusion: Understanding Burial and Life Insurance

From Bronze Age to Boomers: How Life Expectancy Went From Meh to Magnificent

How Long Will You Live? A Look at Life Expectancy Throughout History (and Why You Might Need Life Insurance)

Beyond “My Beloved Spouse”: A Guide to Choosing Your Life Insurance Beneficiary

The Beneficiary Bunch: Understanding Your Options

Life on the Edge? How Your Hobbies Can Affect Your Life Insurance Rates

Beyond the Premium: Unveiling the Unexpected Links Between Hobbies and Life Insurance

Unveiling the Different Players (and Why We’re Your Guide!)

Insurance Companies: Not All Created Equal! Find Your Perfect Match with Our Help

Cracking the Code: Cash Value, Loan Value, Surrender Value – It’s All in the Life Insurance Policy!

Beyond the Death Benefit: Unlocking the Hidden Gems of Your Life Insurance Policy

Beyond the Payout: 6 Unexpected Perks of Life Insurance You Might Not Know

More Than Just a Payout – Unlock 6 Hidden Gems for Your Loved Ones