Skip to main content

Check out our 3Q2024 Market Review and Investment Outlook for the remainder of 2024

Security concept Lock on digital screen illustration

5 Best Practices to Curb Your Cyber-Risk

Photo of author, David Nolan.
David Nolan
Senior Investment Strategist

While cyber-attacks on familiar names like Target and credit reporting company Equifax have made headlines in recent years, cyber-attacks in 2019 have been plentiful and worldwide. Some examples include:

  • In January, Singapore's Ministry of Health (MOH) revealed a data breach involving 14,200 individuals. While the number may not seem all that serious, the nature of the incident certainly was -- given that these people were all diagnosed with HIV. An unknown hacker managed to steal the information -- alongside 2,400 of their contacts -- and the records were published online.
  • Facebook is a constant source of data leaks and security failures these days -- and an incident in April was no exception. Two AWS (Amazon) servers were found by researchers to store over 540 million records including account names, Facebook IDs, and user interaction data. The servers in question were owned by third parties and were not properly secured.
  • Another data breach in April involved the Georgia Institute of Technology. Georgia Tech said a vulnerable web application provided access to a database which stored the personal data of current and former staff and students. In total, 1.3 million individuals are believed to have been affected.
  • Yet another data breach in April involved automaker Toyota. The company has recently faced a barrage of intrusions across Australia, Thailand, Vietnam, and Japan, and in the last case, as many as 1 million customers and employees were impacted. Reports suggest that eight Toyota subsidiaries and dealerships were attacked, and hackers were able to access internal computer systems. Names, dates of birth, and employment information -- at the least -- were involved.
  • In the U.S., a data leak involving individuals seeking out rehabilitation for addictions in April also proved to be a serious breach of trust. An unsecured database stored 4.91 million records including patient names and the treatments they sought.
  • First American, a real estate and insurance giant, said in April that a data breach of critical severity had revealed 885 million documents. Dating back to 2003, these records included Social Security numbers, driver's license images, financial data, and transaction records. What made matters worse is that the information was available on the firm's website for anyone to steal.
  • In June, it was disclosed that information belonging to up to 9 million Quest Diagnostics patients had been compromised. AMCA, a billing collections partner, was at fault. A hacker managed to access the firm's systems; and it is possible that financial information, Social Security numbers, and medical information has been either exposed or stolen outright.

    Best Practices
    With cyber-hacking becoming an almost daily occurrence, what can we do as individuals and companies to protect ourselves? Here are five best practices to consider:

    #1 Password Management
    Creating a strong password is a simple thing to do, yet it’s often overlooked in lieu of more complex technologies and practices to protect a system. However, a strong, unique password is not only a great first step in cybersecurity, but it’s the simplest, easiest way to prevent unauthorized access to a system. For the highest level of protection, passwords should have no fewer than eight characters (a mix of upper and lowercase letters, numbers, and symbols) and should not include words that would normally be found in a dictionary. Consider using passphrases, such as a made-up sentence, to help remember increasingly complex passwords.

    #2 Device Deployment
    A second cybersecurity best practice to adopt is very straight-forward: Follow manufacturers’ recommendations for how devices should be deployed. Don’t cut corners to save time or money when it comes to deploying new devices to employees.

    #3 Updates and Patches
    Another simple but often overlooked step in cybersecurity is keeping device firmware and software up-to-date. Updates provide patches against security threats that may exist, as well as patches for bugs in the software.

    #4 Secure the Ecosystem
    All devices and systems are part of an overall ecosystem, so securing the network and everything that connects to it is another step toward maximizing cybersecurity.

    #5 Ongoing Management and Maintenance
    Cybersecurity is not a one-time consideration; it’s an ongoing process. It’s critical to continually engage in password management, proper device deployment, system updates and patches, and to replace components that may no longer be supported by the manufacturer. It’s also important to look at components that may wear out over time, such as hard drives, workstations, laptops and even IP cameras that may be vulnerable to hackers.

    Despite the likelihood that we will all experience a cyber-hack at some point, it is possible to lessen the odds of becoming a victim. Consult with a professional IT company for questions and concerns. For more details on cybersecurity practices, check out this Security Magazine article.


    Source: https://www.zdnet.com/pictures/these-are-the-worst-hacks-cyberattacks-and-data-breaches-of-2019-so-far/12/

Related Insights
NMS Blog Eggs 800px

Large Eggs, Small Eggs: Rising Concentration in Stocks

With all the fun and activity of summer, it can be hard for investors to maintain their concentration. The stock market, though, has been picking up that slack for some time now. Peaking under the hood of the U.S. stock markets, we see them attaining a degree of concentration not seen for many years. This “concentration” refers to the outsized influence that a few stocks have on stock market indices, because of how the indices are put together. Fundamentally, you can think of concentration as the opposite of diversification. While an index may appear diversified on the surface, in reality it may be substantially skewed toward a handful of companies or a particular sector. So how does market concentration work? Learn more.

Read More
Jorge salvador b MV Avgf1 Rd M unsplash DPN blog

Should All-time Highs in the Stock Market Lead You to Diversify into Alternative Investments?

As the U.S. stock market hits new highs in 2024, it begs the question, “Should I diversify some of my stock market risk into non-traditional assets like alternatives?” While the answer varies from person to person, the concept is one worth exploring for many investors.

Alternative investments are financial assets that fall outside the traditional categories of stocks, bonds, and cash. They are often used in investment allocations to diversify portfolios, hedge against risks, and seek higher returns. Learn more about the common types of alternative investments and their characteristics.

Read More
I Stock 1411406485

How to Freeze Your Credit, Benefits of Doing So

Protecting your personal information is more important now than ever before. With the increasing number of data breaches and identity theft cases, it's crucial to take proactive steps to safeguard your credit. One effective way to do this is by freezing your credit. Let's dive deeper into what credit freezing is, how to freeze your credit, and the benefits of taking this precautionary measure.

Read More
Play