Protecting Your Information
What You Can Do
Protecting yourself, your family and your personal information is an important part of what you do every day. The threats are numerous and wide-ranging. We've grouped those threats into some basic categories along with some recommendations on how to manage them effectively. Take a minute to review the information and better protect yourself.
{beginAccordion}
Types Of Threats
Natural Disasters
- Storms
- Floods
- Ice storms
Other Disasters
- Fire
- Electrical failure
- Plumbing failure
Utility and communication interruption
- Electricity interruption
- Telephone service interruption
- Voice service
- Data service
Property crime
- Theft
- Vandalism
Cybercrime
- Social engineering
- Telephone call
- Phishing
- Account compromise or takeover
- Bank account
- Email account
- Telephone account
Financial crime
- Deposit accounts
- Wire fraud
How Cyberware Incidents Occur
Malware
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Examples include:
- Infected website
- Infected e-mail
- Removable media
Cryptographic ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid. Examples include:
- Infected website
- Infected e-mail
E-mail account takeover — Phishing
Unsolicited e-mail request seeking information such as your e-mail password or bank account information. Often involves a fake login screen designed to imitate the legitimate one.
Bank account compromise
When someone acquires your security controls and gains access to your account. Examples include:
- Phishing
- Social engineering
- Online banking
Data theft
When someone gains access to your personal information. Examples include:
- Device theft
- E-mail content
- Cloud storage (data breach)
- Removable media
Protect Your Data
Data backups
Back up your computer frequently:
- Perform full backups several times a year
- Perform partial backups as needed
- Store back-ups offsite
Data protection
- Use antivirus software
- Use a personal firewall if possible
- Secure personal information on your computer with secure passwords and ID's
- Store personal information in a secure area:
- In a location away from your computer
- In a secure vault
- If necessary, store data back-ups in a different location than your computer:
- Perhaps at work
- Restrict access to your devices
Removable media
Great to use if your computer is in a common area:
- Optical (CD/DVD)
- USB Devices
- "Thumb" drives
- External hard drives
- Memory cards
WiFi
Personal Wifi:
- Secure your internet connection
- Keep your login credentials private
Public WiFi:
- Don't access sensitive information over an unsecured network
- Vigilance
- Limit webmail access
- Verify by phone
- Keep your login credentials private
- Do not open email from unknown sources
- Do not click links to unknown content
Recovery
Bank accounts
Here's what to restore from backup:
- Notify Fidelity Bank (1.800.220.2497)
- Close impacted accounts
- Open new ones with tighter security controls
- Notify law enforcement
Wire fraud
Here's what to restore from backup:
- Notify Fidelity Bank (1.800.220.2497)
- Notify law enforcement
Customer information
Here's what to restore from backup:
- Investigate the extent of the compromise
- Contain breach ASAP (As Soon As Possible)
- Notify customers
Email accounts
Here's what to restore from backup:
- Disable account
- Change password
- Re-enable account
Malware
Here's what to restore from backup:
- Disinfect device
- Restore applications and data
Cryptographic ransomware
Here's what to restore from backup:
- Restore data from backup
Monetary loss/liability
Here's what to restore from backup:
- Budget
- Insurance
Resources
- Cybersecurity for Small Business (FCC)
- Cyber Security (Louisiana GOHSEP)
- Stay Safe Online (NCSA)
- STOP.THINK.CONNECT (APWG)
- Internet Crime Complaint Center (IC3) (FBI)
- Fidelity Bank Customer Education
{endAccordion}
This material has been provided for informational purposes only. The views and strategies described on this page may not be suitable for everyone.