Protecting Your Identity 

We value your relationship and respect the privacy of your information, which is why we want to help you actively protect yourself against cyber-attacks. Test your knowledge about cybersecurity below and implement these best practices to protect your internet-enabled devices.

DEBUNKING CYBERSECURITY MYTHS

MYTH 1: I set a strong and complex password to my account, so I’ll be OK. A strong password is important to security, but this alone is not enough to prevent a cyber-attack. Use different passwords between accounts, making it harder for someone to gain access. Activate multi factor authentication (security questions, identification code via text message etc.) whenever possible.

MYTH 2: My computer behaves normally, so it can’t be infected. Hackers work to ensure that their activities are not noticed by you. A dangerous hacker works stealthily to take control of your computer and cause damage to your equipment or steal information they can use for their profit.

MYTH 3: We have anti-virus software and a firewall. We are safe. Security is a process; not a product. Organizations spend millions on security and a single wrong click is all it takes for the malware to spread. Security awareness is an essential tool in combating the threats we face in our network environments.

MYTH 4: Social media is where my friends hang out. No malware there. When a social network becomes popular, you can bet that cyber crooks will be there. Cybercriminals love our trust in social networks and have crafted special scams to fool us into sharing our logins on fake pages and clicking malicious links.

MYTH 5: The Internet of Things (IoT) is a safe development. Every single Internet-enabled device in the world with its own unique IP address can be individually connected to the internet. Smartphones, refrigerators, washing machines, cars; a countless number of devices fall into this category. As connectivity to the Internet continues to grow, so does the cyber-attack surface available to hackers.


protect your devices

You hold the power to protect yourself:

  • Connect only what is needed. If a device does not need to be online, avoid connecting it to the Wi-Fi network.
  • If the IoT device has the option to automatically update, enable that feature. Keep the device up to date as often as possible.
  • Replace all default passwords on the IoT device with strong complex passwords.
  • Ensure that the providers of these products and services have clear privacy and data usage policies.
  • Limit the number of applications on these devices. Also, download applications created by trusted entities and from reputable providers, such as the Google Play or iTunes App stores, rather than gray-market app platforms.


For further information on how Radius Bank protects your information, please visit www.radiusbank.com/policies/security .