Five Ways to Help Secure Your Data in Light of the IRS Breach

Five Ways to Help Secure Your Data in Light of the IRS Breach

It’s been floating around in the media recently, the attack where hackers “used taxpayer-specific data, including Social Security information, date of birth and street addresses, from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through the ‘Get Transcript’ application.” This is just another example that proves the sophistication of hackers already having all the information they need to steal identities.

Advice from various security experts actually leaves all but a warm fuzzy feeling, saying that people can do nothing to secure their identity; however, there are some things people can do to make it more difficult for hackers:

  1. Use multifactor authentication. If any of your accounts offer this, turn it on. What typically happens is that you enter your password and then you’ll receive either an email or text message with a one-time use code that you must enter before you are allowed access to your account.

  2. Change your passwords…again. This is talked about until people are blue in the face from saying it and people’s ears bleed from hearing it, but apparently it still needs to be said. Change your password frequently and NEVER use the same password twice.

    Consider making your password a sentence, consisting of upper and lower case letters and random symbols. Or, create an anagram based on your favorite song lyrics, movie quotes or sayings. For example, from Harry Potter and the Deathly Hallows, Dumbledore said, “Words are, in my not so humble opinion, our most inexhaustible source of magic…capable of both inflicting injury and remedying it.” This would become the following anagram: “Wa,ImNsHo,OmIsOm…CoBiIaRi.” (Take that, hackers!)

  3. Security questions are a thing of the past. Most sites use security questions like, “What is your mother’s maiden name?” or “What was the name of your first school?” and since public record searches on the Internet are simple, it’s fairly easy for hackers to get these answers.

    A recent study revealed that within 10 tries, an attacker would have a 39% chance of guessing a Korean-speaking user’s answer to the question, “What is your city of birth?” and a 43% chance of guessing his or her favorite food.

  4. Monitor your credit. Do this frequently throughout the year, using free services.

  5. Freeze your credit. Simply call Equifax, Experian or TransUnion and ask to have your account frozen. The agency will then mail a one-time PIN or password to unfreeze your account when you are ready.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3