Page 24 - FOP March 2017 Newsletter
P. 24

You are at risk
Seven steps for your cybersecurity protection
“Malware”—software that is intended to damage or disable computers or computer systems—is short for “malicious software.” It was commonly referred to as computer virus- es, and it has been around since the begin- ning of the internet. It has a new name now because it is far more dangerous and much more strategic. It is intended to steal
your information and to spy on your computers for extended periods of time without your knowledge.
• Look for strange spellings of common companies or unusual spaces or bad punctuation, such as PayePal or ITunesCustomer Service.
• Do not click on links in emails, in social media posts (Facebook, Twitter, etc.), or instant messenger chats (like Skype) unless you are absolutely certain of the link and its source. If you are unsure, don’t click it!
TOM TUOHY
It goes without saying you don’t want spies in
your computer. However, the extent of damage malware can cause and the personal cost and aggra- vation of recovering from an attack is reason enough to take every precaution to protect your data and your computers.
In addition to privacy concerns that emerge from hav- ing spyware track your financial and personal behaviors as well as your travel, your financial data is vulnerable to theft too. You are also unknowingly exposing family members, friends and others who have data stored on your desktop through your communications with them. The fastest growing malware attack, ransomware, actu- ally blocks your access to your computer system until you pay a ransom to regain access and stop the thieves from publishing, using or destroying your data and your complete system.
You become vulnerable to ransomware if you visit unsafe websites or open malicious email attachments. According to Microsoft data security, your entire system is encrypted by hackers and a large amount of money is demanded to restore the files. Due to the encryption of the files, it can be practically impossible to reverse-en- gineer the encryption or “crack” the files without the original encryption key—which only the attackers have access to.
It can be very difficult to restore your PC after a ran- somware attack—especially if it’s infected by encryption ransomware. The best advice is to ensure all of your files are securely backed up in a remote, unconnected back- up or cloud storage.
What should you do?
Take these seven steps to protect yourself from online dangers.
• Do not ever open emails or email attachments from people you don’t know, or that you weren’t expecting.
easy do you think it is for hackers to access your system while you are on it?
• Install antivirus and malware protection software on every one of your computers, and make sure it is up to date. Run regular scans. I take an added precaution at home by operating the free Malwarebytes program (www.malwarebytes.com).
• Back up your entire system regularly. I use and high- ly recommend the cloud-based system Carbonite, which will automatically back up your entire desktop and all your data every minute for just a few dollars a month for FOP members in the Benefits Plan.
• Protect your passwords. LastPass is a free service, with a $1 a month premium for mobile devices, available to all FOP members in the Benefits Plan. It truly is the last password you ever have to remember, and it en- crypts every one of your current and new passwords and automatically enters them when you visit web- sites. Passwords are often stolen in cyberspace. Your passwords will now be encrypted and protected as they are entered and when they are sent. The service also can generate new, secure passwords and provide security reports.
Take a minute to visit your FOP Benefits Plan web- site today in the Retail Discounts section and regis- ter for LastPass and Carbonite, and remember to fol- low the seven steps above. Don’t wait until it’s too late. Registration for FOP members and family is free. Visit www.fopbenefitsplan.com or call 1-866-729-5454 for assistance with registering. d
Tom Tuohy is the founder of Tuohy Law Offices and the FOP Benefits Plan. He has been a police lawyer for 34 years. His father was a CPD detective and his grandfather was CPD Chief of Major Crimes. Tom can be reached at 312-559-8400.
FOP
Benefits Plan
• Regularly update your software programs and the operating system you are using.
• Secure your personal Wi-Fi network with a strong password. Never use open, free, public Wi-Fi systems. If you can access it that easily, how
24 CHICAGO LODGE 7 ■ MARCH 2017


































































































   22   23   24   25   26