{"id":4378,"date":"2017-12-12T10:43:39","date_gmt":"2017-12-12T15:43:39","guid":{"rendered":"https:\/\/www.figmarketing.com\/blog\/?p=4378"},"modified":"2023-09-06T10:54:19","modified_gmt":"2023-09-06T15:54:19","slug":"compliance-corner-cyber-security","status":"publish","type":"post","link":"https:\/\/www.figmarketing.com\/blog\/compliance-corner-cyber-security\/","title":{"rendered":"Compliance Corner: Cybersecurity"},"content":{"rendered":"<p>We\u2019ve all seen news in the past regarding major breaches at high-profile organizations such as Target, Anthem, Yahoo, Equifax, and even the SEC. These organizations are just a few examples and demonstrates the fact that if major organizations are impacted by cybersecurity breaches, then small organizations and individuals most certainly have vulnerabilities as well.<\/p>\n<p>Yahoo\u2019s breach compromised approximately 3 billion accounts worldwide, while Equifax\u2019s breach may impact approximately 143 million Americans, so this issue is far-reaching. As we become more reliant on technology to get our business done, we need to be more cognizant of the little things we should be doing to protect our systems; and ultimately, the sensitive information that is housed within it.<!--more--><\/p>\n<p>It\u2019s a fact that fraudsters seek easy targets and if anything, are persistent. Keep in mind, a fraudster\u2019s time is completely dedicated to searching for and exploiting vulnerabilities in a system; finding ways to access data they can use for their financial gain. In other words: it\u2019s their day job. Most people and organizations may not spend much time thinking about cybersecurity\u2014certainly not as much time as fraudsters do.<\/p>\n<p>Prevention may be difficult though, as fraudsters are always trying to stay one step ahead. There are, however, good practices you can follow to make it difficult for the fraudsters.<\/p>\n<p>These people utilize many methods to gain access to information in your computer systems. One of the most common methods used is \u201cphishing\u201d, because it\u2019s so easy. Phishing schemes are typically in the form of emails that appear to be legitimate requests from companies you may do business with. However, when accessed fully, a fraudster may gain unlimited access to your emails, possibly your computer and perhaps the entire network you\u2019re connected to.<\/p>\n<p>Phishing emails can look official and may utilize company logos or even reference specific names of people who work at the company. So, what can you do? How to do you protect yourself when a fraudster goes to great lengths?<\/p>\n<p>Phishing emails often have clues you should be aware of. First, you should read the email carefully. An email that has an urgent tone, has obvious misspellings, contains grammatical errors, and\/or is requesting highly sensitive information (i.e. Social Security information, bank account information, login IDs, passwords, etc.) are typically red flags that identify a fraudulent email. Secondly, hyperlinks within phishing emails often provide major clues.<\/p>\n<p>If you hover your mouse pointer over a hyperlink, it&#8217;s possible to see where the link is being directed without actually clicking on it. If the hyperlink is directed to some other source, this is a major red flag, so don\u2019t click on it.<\/p>\n<p>When in doubt, you should err on the side of caution and call the company where the email originated to verify if it is a legitimate request. The two-minute phone call to verify a request for sensitive information may save you a ton of headaches. Lastly, it\u2019s important to keep your antivirus and technology security current. Never hit the snooze button when it\u2019s time to update your software for security patches.<\/p>\n<p>As always, should you have any compliance questions, we are always here to help. Please feel free to send an email to <span style=\"color: #754545;\"><strong><a style=\"color: #754545;\" href=\"mailto:compliance@figmarketing.com\">compliance@figmarketing.com<\/a><\/strong><\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all seen news in the past regarding major breaches at high-profile organizations such as Target, Anthem, Yahoo, Equifax, and even the SEC. These organizations are just a few examples and demonstrates&hellip;<\/p>\n","protected":false},"author":4,"featured_media":4379,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[364],"tags":[259,324],"acf":[],"_links":{"self":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/4378"}],"collection":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/comments?post=4378"}],"version-history":[{"count":6,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/4378\/revisions"}],"predecessor-version":[{"id":12842,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/4378\/revisions\/12842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media\/4379"}],"wp:attachment":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media?parent=4378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/categories?post=4378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/tags?post=4378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}