Security

Protecting Your Identity & Staying Safe Online

In today’s digital world, safeguarding your identity is more important than ever. Identity theft can happen to anyone, but by staying informed and taking precautions, you can protect yourself from potential financial and personal harm. At Alcose Credit Union, we care about your safety and are here to guide you through best practices for securing your information.

Protecting Your Passwords

Create Strong Passwords:

A strong password is your first line of defense. Make sure your passwords are at least 12 characters long, and use a combination of letters, numbers, and symbols. Avoid using easily guessable information like your name, birthday, or common words.

Tips for Creating Strong Passwords:

  • Use a mix of letters, numbers, and symbols.
  • Avoid common words or easily guessable information (example: birthdays or pet names).
  • Consider using a password manager to store and generate secure passwords.

How Often to Update Passwords:

  • Update your passwords regularly, especially for critical accounts (like online banking).
  • Avoid reusing passwords across multiple accounts.

Steps to Take if You Believe you’re a Victim of Identity Theft

If you suspect identity theft, act quickly. Contact your credit union to report any suspicious transactions. You should also file a report with Federal Trade Commission (FTC) and consider freezing your credit to prevent further damage.

Signs of Identity Theft:

  • Unusual or unauthorized activity on your credit card or bank statements.
  • Bills for services you didn’t sign up for.
  • Notices about accounts you didn’t open.

Immediate Actions to Take:

  • Contact your credit union and any other financial institutions.
  • File a report with the Federal Trade Commission (FTC) at identitytheft.gov.
  • Consider freezing your credit reports with major credit Bureaus (Equifax, Experian, TransUnion)

Mobile Device Security: Protecting Your Smartphone & Tablets

Our phones store a wealth of personal information, so it’s critical to keep them secure. Always use a strong lock screen, avoid downloading apps from unknown sources, and stay cautious when using public Wi-Fi. You can also enable remote wipe feature to safeguard your data if your device is lost.

Tips for Securing your Mobile Devices:

  • Always lock your phone with a PIN, password, or biometric authentication (fingerprint/face recognition).
  • Keep your device software up to date with the latest security patches.
  • Only download apps from trusted sources like the Apple App Store or Google Play Store.
  • Enable remote wiping in case your device is lost or stolen.

Avoid Public Wi-Fi Risks:

  • Avoid conducting sensitive transactions (like online banking) on public Wi-Fi.
  • Use a VPN (Virtual Private Network) when accessing public networks.

Email Security

  • Avoid Suspicious Attachments & Link:

Don’t open attachments or click on links from unknown senders. These may contain malware or lead to phishing sites.

  • Use Strong Passwords & Two Factor Authentication (2FA):

Ensure your email is protected with a strong, unique password, and enable 2FA to add an extra layer of security.

  • Beware of Email Spoofing:

Cybercriminals may impersonate someone you know. Always verify the sender’s email address, especially if they ask for sensitive information.

  • Encrypt Sensitive Emails:

Use encryption tools to protect sensitive information sent over email.

  • Recognize Common Phishing indicators:

Watch for poor grammar, urgent language, and unexpected requests for personal data.

Social Networking Security

  • Limit Sharing of Personal Information:

Be mindful of what you share on social networks. Personal information can be used in identity theft or targeted attacks.

  • Adjust Privacy Settings:

Regularly review and update your privacy settings to control who can see your posts, photos, and profile information.

  • Beware of Social Engineering:

Attackers may use social media to gather information for a phishing attack. Avoid accepting friend request from strangers.

  • Watch Out for Suspicious Links:

Phishing scams often appear on social media, disguised as giveaways, promotions, or sensational headlines.

  • Be Cautious with Third-Party Apps:

Limit the number of apps connected to your social media accounts. These apps can request access to your data.

Phishing Awareness

  • Identify Phishing Emails:

Look for generic greetings, unexpected attachments, and URLs that don’t match the company’s official domain.

For example, “www.paypal-support.com” instead of “www.paypal.com”

  • Spear Phishing Attacks:

Be aware of targeted phishing attacks aimed specifically at you or your organization. These attacks often use personalized information.

  • Report Phishing Attempts:

If you receive a suspicious email, report it to your IT or Security department and avoid responding.

  • Hover Over Links Before Clicking:

Always check where a link leads by hovering over it with your mouse, and never enter credentials on a suspicious page.

  • Check for HTTPS:

Ensure that the websites you visit have an HTTPS connection, especially when entering sensitive information.

General Cyber Hygiene

  • Regular Software Updates:

Keep your operating systems, browsers, and apps up to date to patch security vulnerabilities.

  • Use Antivirus Software:

Regularly run scans with trusted antivirus software to detect and remove potential threats.

  • Secure Your Wi-Fi Network:

Use a strong password for your Wi-Fi and avoid using public networks for sensitive activities.

  • Backup Your Data Regularly:

Regular backups can save your data in case of ransomware or other attacks.

  • Be Wary of Unsolicited Phone Calls or Messages:

Scammers may use these methods to extract sensitive information. Always verify the identity of the caller or sender.

Additional Resources & Support:

LIMITED TIME!! Share Certificate (CD) 4.50% for 6 months!! CD Request Form
+