Cybersecurity: Keeping your information safe

Cybersecurity: Keeping your information safe

In recent years, remote work, online communication and conducting business through virtual channels has skyrocketed. And just as quickly, the level of fraudulent activity by criminals has increased to take advantage of this trend.

To attempt to steal your identity, criminals often create legitimate-looking emails, known as “phishing,” and emails that appear to come from an individual or business you are familiar with, known as “spear-phishing.” The telephone equivalent of these tactics is known as “vishing.”

Whether online, on the phone or elsewhere, here are some important tips to help keep your data safe.

Stay alert online and on the phone

Always consider your personal data as potentially exposed (including your name, SSN, phone number, address, and passwords) along with the data of those you are connected to in your household. Data breaches are sadly more common these days, making personal info a hot commodity for scammers. Some things to keep in mind:

  • Check your accounts often:?Regularly logging into your financial and social media accounts is a great habit. Enable two-factor authentication for an extra layer of security.
  • Be cautious on social media:?Sharing too much information, like extensive vacation photos or dates, could unintentionally reveal when you're away from home. Also, watch out for seemingly innocent games or quizzes that could trick you into disclosing personal info, such as those asking for your birth month, first or last name. This could expose or confirm for a fraudster data about yourself.
  • Don’t share too much on the phone:?Never give out personal information during a call you didn’t initiate. Legit companies typically won’t ask for sensitive details like your SSN over the phone. If you're unsure, hang up and dial the official number found on your card or statement to verify the call's authenticity. Best practice? If you don’t recognize the number or aren’t expecting a call, let it go to voicemail. You can always call back if it turns out to be legitimate.

Practicing email safety

To avoid becoming a victim of cyberfraud, start by following a few simple guidelines.

First, never include any personal information in an email that you wouldn’t be comfortable putting on the back of a postcard and dropping in a mailbox. Ask yourself: Does this person really need the information they’re asking for to do their job properly? Then examine the email carefully before downloading attachments or clicking on any links.

If something doesn’t seem quite right, and you know the sender personally, the safest course of action is to contact the sender via phone or a separate email (do not respond to the email) to verify its legitimacy. If the sender is a business and the email, looks suspicious, you can ignore it, delete it, or open a separate browser window or tab to visit a website directly.

Identifying red flags in email

Here are a few warning signs to look for when receiving emails:

  • Unusual greetings, misspelled words and improper grammar. Phishing emails often originate from foreign countries, so the improper use of English is common.
  • Threatening or intimidating language demanding that you respond immediately. Attempts to scare and intimidate recipients are common tactics used by phishers. If something is seriously wrong, a company would not contact you via email.
  • Links to a website that do not appear to be affiliated with the sender. You can hover your mouse over the link to see its true origin without opening it.
  • Messages asking for financial information. A legitimate business will not ask for this by email.

As a precaution, it often is worthwhile to sign up for a credit monitoring service such as Experian, TransUnion or Equifax. These services alert you whenever someone asks for your credit history, applies for a loan or tries to open a credit card in your name. There are also a number of services that provide identity theft protection, such as LifeLock, LastPass and others. These services can help protect you from fraud and regain control of your finances if you do become a victim of identity theft. More information is available at IdentityTheft.gov.

How we protect your information

At Fiduciary Trust International, we are committed to safekeeping your assets. We have developed technologies that eliminate the need to use email or regular mail channels to share information with you. And, we store all your private information in our own computer systems, using state-of-the-art databases, which are used by national and international corporations around the world. All forms of electronic communications are protected by firewalls on our systems as well as the systems used by our parent company, Franklin Templeton.

We also train all employees on how to safely transmit and store sensitive data. Whenever we send you an email, we use sophisticated encryption technologies to transmit information that only the sender and recipient can read. Encryption is a standard security measure that has proven effective at protecting our outgoing communications and keeping your private information private. If you ever have any doubt that an email is actually from us, please call your advisor to verify it. If the phone number provided in the email doesn’t look familiar, be sure to instead use the number you have on file for your advisor.

What to look for from your advisors

Of course, cybersecurity is only successful when you cover all the bases. Ask all of your advisors to explain how they are storing, processing and sharing your information. If their responses are highly technical, vague, or difficult to understand, your Fiduciary Trust advisor can often translate them into plain language for you. We can also work directly with your outside advisors to ensure your information is being handled safely and we are all moving in the same direction toward your goals.


Written by: Rod Sayegh, Head of Digital Strategy and Programs


?Next steps:




This communication is intended solely to provide general information. The information and opinions stated?may change without notice. The information and opinions do not represent a complete analysis of every material fact regarding any market, industry, sector or security. Statements of fact have been obtained from sources deemed reliable, but no representation is made as to their completeness or accuracy. The opinions expressed are not intended as individual investment, tax or estate planning advice or as a recommendation of any particular security, strategy or investment product. Please consult your personal advisor to determine whether this information may be appropriate for you. This information is provided solely for insight into our general management philosophy and process. Historical performance does not guarantee future results and results may differ over future time periods.

View our terms and conditions at https://www.fiduciarytrust.com/disclosure

要查看或添加评论,请登录

社区洞察

其他会员也浏览了