Cybersecurity Tip of the Week http://fcnb.ca/cybersecurity.html hourly 1 1970-01-01T00:00+00:00 Robo-Advisors http://fcnb.ca/pc_url_38983288 <p class="plain"></p><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/26c/1b8/112/2019-06-26-Robo-Advisors.jpg' style="margin: 15px 15px 15px 0px;float: left" height="234" size="250" border="0" daid="18007831">Robo-Advisors </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Robo-advisors are increasing in popularity thanks in part to easy-to-use smartphone apps and online portals that make setting up an account convenient and quick. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">But if you’re considering using a robo-adviser, it’s important you’re aware of the cybersecurity risks and considerations before opening an account. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>What are the risks? </b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">It seems that data breaches are becoming a common event these days, this can be scary for many reasons but it is something extremely nerve-wracking for people considering this technology-based tool. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The good news is that security is a primary concern for robo-advisors as well. Banks (and robo-advisors) have high levels of security encryption that keeps your assets and data safe. That’s why you rarely hear about a bank being hacked. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Also, many robo-advisors are owned by larger banks and investment houses, which means that investors get the same level of protection that an in-person banker enjoys. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Third-party apps that require access to your financial institution accounts may pose a problem in the event of a breach or hack.  It is important to talk to your financial institution to ask what impact using this app may have on your account, and if your funds are protected if the app or website gets hacked.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How do I protect myself?</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">As with any app or online account, here a few things you can do to help protect yourself from a data breach:</font><ul><li class="plainlarge">Use a complex password. </li><li class="plainlarge">Change your password on a regular basis. </li><li class="plainlarge">Never use the same password.</li><li class="plainlarge">Make sure your devices (laptops, tablets, phones) are locked in case of theft or lost. </li><li class="plainlarge">Review your accounts and credit report occasionally. This would avoid an unpleasant surprise when you go to make a large purchase using your investments. </li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">To learn more about investing using a robo-advisor click <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38981629" class="plainlarge">here</a>.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Whether you decide to work with a human advisor or robo-advisor, make sure you choose the right one. To help you make the decision, use our <a rel="" link="" target="_blank" href="http://cms.bigsanto.com/Tools/file_direct_link.html?node_id=34705671" class="plainlarge">Five Steps to Choosing an Advisor</a> workbook or visit our <a rel="" link="" target="_blank" href="http://fcnb.ca/savingandinvesting.html" class="plainlarge">Saving & Investing</a> webpage for more information. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><i>*This post is not intended to provide investment, financial, legal or other professional advice - always do your research and check registration before you invest. </i></font></div><div class="plain"><font style="" class="plainlarge"><i><br></i></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://cms.bigsanto.com/Tools/file_direct_link.html?node_id=38977970" class="plain"><img width="80" daid="18007833" src='//0104.nccdn.net/1_5/26c/1b8/112/Robo-Advisors-1---How-it-works.png' height="400" keep_prop="0" size="-1" border="0"></a>  <a rel="" link="" target="_blank" href="http://cms.bigsanto.com/Tools/file_direct_link.html?node_id=38977971" class="plain"><img width="160" daid="18007835" src='//0104.nccdn.net/1_5/1a5/0d1/1c3/Robo-Advisors-2---Protect-and-inform-yourself.png' height="400" keep_prop="0" border="0"></a> <a rel="" link="" target="_blank" href="http://cms.bigsanto.com/Tools/file_direct_link.html?node_id=38977972" class="plain"><img width="160" daid="18007837" src='//0104.nccdn.net/1_5/1a5/0d1/1c3/Robo-Advisors-3---Questions-to-consider.png' height="400" border="0"></a><br></font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></div><div class="plain"><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></div><div class="plain"><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe </a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div><div class="plain"><br></div><p class="plain"></p> FCNB 2019-07-17T06:03:38-07:00 Robo-Advisors Tracking your health with an app? Facebook is too http://fcnb.ca/pc_url_38976808 <p class="plain"></p><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/195/1ec/34d/2019-07-03-Tracking-your-health-with-an-app.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="18003133">Tracking your health with an app? Facebook is too </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">You don’t even have to be a Facebook user for the social media platform to collect data on you – and highly personal data, at that! </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">If you’re using a phone app that tracks things like your menstrual cycle, heart rate, exercise habits and calories burned, chances are good that that app is sending that information along to – you guessed it – Facebook.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>Fuel for advertising</b></font></div><div class="plain"><font style="" class="plainlarge">A Facebook-provided analytics tool called “App Events” lets app developers track and store user data, then send it right to Facebook, who then use it to fuel their advertising algorithms. Developers use App Events to track how and when people used their apps, and to gain insights for their own advertising purposes.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The social media platform was <a rel="" link="" target="_blank" href="https://www.bbc.com/news/technology-47341533" class="plainlarge">caught acquiring sensitive data from Flo Period & Ovulation Tracker</a>, and around 30 other apps so that information could be used for hyper-targeted ads. People were willingly inputting this info into their apps, but they had no idea what would happen to the data beyond the primary function of the app.</font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">An example: Say a woman is trying to get pregnant, so she’s tracking her periods, ovulation and sexual activity in the Flo Period app. The app sends that information to Facebook, who then hit her with ads for maternity clothing, prenatal vitamins, diapers and daycares in her area.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The goal of most tech is to slurp up information and turn it into profit, no matter how private the data. And it doesn’t get much more private than bodily functions! </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>Feigning ignorance</b> </font></div><div class="plain"><font style="" class="plainlarge">Facebook claims it requires apps to tell users what info is shared and forbids apps from sending intimate data. But it did nothing to stop the flow of that sensitive data.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Given their lax attitude toward data privacy, it’s not hard to imagine Facebook selling private information to health insurers, who would pay a premium for it and even use it to decide who they’ll cover. Free health apps have already been known to give up sensitive information to insurance companies – why wouldn’t Facebook do it?</font></div><div class="plain"><font style="" class="plainlarge">  </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>Digital gangsters</b></font></div><div class="plain"><font style="" class="plainlarge">A Wall Street Journal investigation found that many of these apps didn’t disclose that they would be sharing this information with third parties, or with Facebook specifically. Shortly after the Journal story broke, New York Governor Andrew Cuomo called for further investigation into this invasion of privacy. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">This all comes on the heels of a scathing report out of the U.K. that essentially called Facebook digital gangsters who are abusing the power of their platform. And it’s not just Facebook; Google and Amazon have a scary amount of data on every one of us, which means we need to be taking this seriously.  </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>Data privacy should be an election issue</b></font></div><div class="plain"><font style="" class="plainlarge">While the issue of data privacy is finally starting to be a high priority in the States, with investigations into breaches and tougher policies mirroring those or Europe, in Canada we’re just not there yet. We need to push for stricter privacy legislation and make it an election issue. We need to demand accountability from these data-hoarding corporations.   </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">*<i>Blog post from <b>Beauceron Security</b>, for more information visit: </i><a rel="" link="" target="_blank" href="https://www.beauceronsecurity.com/blog?offset=1552065484713" class="plainlarge">https://www.beauceronsecurity.com/blog?offset=1552065484713</a> </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></span></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></span></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><br></div><p class="plain"></p> FCNB 2019-07-10T06:00:30-07:00 Tracking your health with an app? Facebook is too Dealing with Spam http://fcnb.ca/pc_url_38971881 <div class="plain"><font style="" class="plainlarge"><br></font></div><img width="250" align="left" daid="17999689" src='//0104.nccdn.net/1_5/0e0/385/3af/2019-07-10-Dealing-with-Spam.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250"><div class="plain"><font style="" class="heading1">Dealing with Spam</font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge">Spam is more than just an email chain letter.  It can also include malware, spyware, phishing, and false or misleading representations carried out through any means of telecommunications, text messages (short message services – SMS), social network sites, website, apps, blogs, and more.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Realize that you are an attractive target to hackers. Don’t say: “It won’t happen to me.” The best way to detect and avoid scams is to get to know the tactics and schemes scam artists use.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Cut down on spam by setting up spam filters on your email program, and unsubscribe to mailing lists you’re no longer interested in.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-07-03T06:00:06-07:00 Dealing with Spam How to spot misleading info online and what to do about it http://fcnb.ca/pc_url_38966991 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/2f9/041/0be/2019-07-03-How-to-spot-misleading-info-online-and-what-to-do-about-it.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="17997354">How to spot misleading info online and what to do about it</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">With all the information that’s available online, it’s inevitable that some of it will be wrong. Sometimes it’s a case of inaccurate facts, sometimes it’s opinion, satire or parody, and other times, it’s a case of deliberate attempts to mislead or influence public opinion through alternative media.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Either way, people are becoming less sure of the information they see online and elsewhere. According to a recent <a rel="" link="" target="_blank" href="https://www.ipsos.com/en-ca/news-polls/RTNDA-Trust-and-Confidence-in-News-Sources-May-25-2018" class="plainlarge">Ipsos Poll</a>, on behalf of Radio Television Digital News Association (RTDNA), Canadians are less likely to trust traditional news media, with only 65% declaring some level of trust, and only 11% trusting the media “a great deal.” In the same poll, 68% of Canadians claimed they can always tell the difference between a news story and an opinion or commentary piece, but 24% admit they’re not so sure.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">While “click-bait” is an internet concept, publishing less than truthful headlines to increase publication sales has been around for a while. You see examples every time you pass the tabloids in the checkout line at the grocery store. But now, false or misleading articles and memes are circulated on social media with the intention of getting us to buy a certain thing, or even vote for a certain candidate in an election.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Now, more than ever, we need to educate ourselves and our children about how to take a more critical look at information and articles shared online. Here are some starting points:</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>Read beyond the headline</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Consider the evidence in the article before believing it. Sometimes, a well-researched news article will be shared by a third party with a misleading headline or conclusion. Other times, the headline was written by an editor, not the journalist, and provides an oversimplified description of a more nuanced take on an issue. Either way, it’s worth your time to read the whole thing before commenting or sharing. If you’re really skeptical, just ignore it.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>Consider the source</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Do you recognize the name of the source? Is it a national media outlet that you’ve heard of and known for years? Is the author trying to get you to buy something? Or vote for someone? Is it trying to provoke an emotional reaction, especially outrage at a person or organization?</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>Investigate</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">Is this the only news source reporting on this story? Searching for “News” related to the article topic in your search engine should pull up similar stories for other news sources.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>Say Something</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><font style="" class="plainlarge">If you go through the steps above and conclude that an article you’ve seen is less than truthful, what should you do? </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Resist the urge to comment or react to it through social media. These interactions will make the article more popular and it will be shared more by the social network. If you do want to alert the person that shared it to your thoughts, do so through a private message, or by phone or text.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainsmall">*Blog post from <b>Cyber Safe</b>, for more information visit: <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plainsmall">https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx </a></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font> </div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-06-26T06:00:05-07:00 How to spot misleading info online and what to do about it Cyber Safe: 5 ways to protect your privacy on a new smart device http://fcnb.ca/pc_url_38959897 <img width="250" align="left" src='//0104.nccdn.net/1_5/12a/388/04d/2019-06-19-5-ways-to-protect-your-privacy-.jpg' style="margin: 15px 15px 15px 0px;float: left" height="166" border="0" size="250" daid="17994939"><p class="plain"><font style="" class="heading1"><br></font></p><p class="plain"><font style="" class="heading1">Cyber Safe: 5 ways to protect your privacy on a new smart device </font></p> <p class="plain"> </p> <p class="plain">Whether it was on your wish list, or you gifted one to a family member, chances are someone in your household received a new device that connects to the Internet. While connected devices (also known as “smart devices”) are fun and make our lives easier, they also provide opportunities for hackers to access personal and private information.</p> <p class="plain"> </p> <p class="plain">Take steps to protect yourself, and your family, by following these tips:</p> <p class="plain"> </p> <p class="plain"><b>1. Secure your home Wi-Fi network</b></p><p class="plain"><b><br></b></p> <p class="plain">Smart devices use the Internet to send and collect data. If your home Wi-Fi connection is not secure, your data is not secure! When using Wi-Fi, the minimum security you should have is wireless encryption and password protection. Under your wireless settings, make sure your router has WPA2 encryption enabled. Then, lock your wireless network with a strong a unique password. A strong password includes uppercase and lowercase letters, numbers, and special characters. </p> <p class="plain"> </p> <p class="plain">If you are an advanced user, create a separate network zone on your Wi-Fi network to connect your smart devices. This is called "device isolation" and functions similarly to "Guest Wi-Fi" networks. </p> <p class="plain"> </p> <p class="plain">When using your smart device on-the-go, connect only to trusted, password-protected networks, and turn off settings that automatically search for Wi-Fi networks.</p> <p class="plain"> </p> <p class="plain"><b>2. Turn off geolocation when not in use</b></p><p class="plain"><b><br></b></p> <p class="plain">Many smart devices have apps that use geolocation to provide services, such as fitness tracking or maps. If an application can see your location, a hacker could too. In your device’s settings, turn off geolocation when you are not using it.</p> <p class="plain"> </p> <p class="plain"><b>3. Before installing apps, understand the app's privacy policy and terms of use</b></p><p class="plain"><b><br></b></p> <p class="plain">All apps have privacy settings that help control who can see your information, and what they see. Customize these privacy settings so personal information, such as full names and contact details, are hidden. Also, be wary of apps asking for unnecessary or excessive information. Take a good look at the permissions, and don't just click “allow” for everything. </p> <p class="plain"> </p> <p class="plain"><b>4. Disable microphones and cameras when not in use</b></p><p class="plain"><b><br></b></p> <p class="plain">Most gaming headsets, smart TVs, smartwatches, and smart speakers come with a microphone and/or camera. If not secure, your device could transmit information you don’t intend it to. Turn off your camera, and mute your microphone, when you are not using it.</p> <p class="plain"> </p> <p class="plain"><b>5. Create usernames that don't contain identifying information</b></p> <p class="plain"> </p> <p class="plain">Oversharing could put your privacy at risk. When setting up a login for your device (or for a game or app), make sure your username does not contain identifying information, such as your name, age, location, or contact information.</p> <p class="plain"> </p> <p class="plain"><i>*Blog post from <b>Cyber Safe</b>, for more information visit: </i><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plain"><i>https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</i></a></p> <p class="plain"><i> </i></p> <p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plain">Learn more about Frauds and Scams</a></p> <p class="plain"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plain">See all Cybersecurity tips</a></p> <span style="" class="plain"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plain">Learn more about how to Get Cyber Safe</a></span><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-06-19T06:44:56-07:00 Cyber Safe: 5 ways to protect your privacy on a new smart device How to safely use Internet banking and investing http://fcnb.ca/pc_url_38955053 <p class="plain"><b><font style="" class="heading1"><br></font></b></p><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17992207" src='//0104.nccdn.net/1_5/0f8/056/269/2019-06-12-How-to-safely-use-Internet-banking-and-investing.jpeg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">How to safely use Internet banking and investing</font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"><b><font style="" class="plainlarge">Cybercriminals will go to extreme measures to get access to your banking information. Once they have access to it, there’s nothing stopping them from taking out a loan in your name, buying a new car, or even applying for a mortgage. They also know that financial institutions use extreme measures to protect your information. So they phish, spy and hack their way into your information from other sources, piecing together what they need to access your financial accounts.</font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"><b><font style="" class="plainlarge">Keep a close eye on your financial accounts on a regular basis. Follow these safety tips to ensure a safer banking experience:</font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"></p><ul><li class="plain"><b><font style="" class="plainlarge">Create a strong password that is unique from your other accounts.</font></b></li><li class="plain"><b><font style="" class="plainlarge">Make sure to use secure websites. Websites that start with https:// or shttp:// use higher security measures than ones that begins with http:// (“s” means “secure”).</font></b></li><li class="plain"><b><font style="" class="plainlarge">Always type in your banking information versus using the autofill.</font></b></li><li class="plain"><b><font style="" class="plainlarge">Don’t use  public Wi-Fi or public computers for sending sensitive or personal information.</font></b></li><li class="plain"><b><font style="" class="plainlarge">When you are finished, close your browser, clear your history and cache, and disconnect from the Internet.</font></b></li><li class="plain"><b><font style="" class="plainlarge">Be suspicious if you get an email from a financial institution asking for your personal information.  Remember: legitimate financial institutions will never ask for your personal information in an email.</font></b></li><li class="plain"><b><font style="" class="plainlarge">Don’t believe everything you read in online newsletters, investing blogs or bulletin boards. Fraud artists often float false information and “hot tips” as part of their efforts to rip off investors or manipulate the market for a particular security.</font></b></li><li class="plain"><b><font style="" class="plainlarge">Knowledge is power. Be aware of the latest frauds and scams. For a full current list, visit our <a link="" rel="" target="_blank" href="http://fcnb.ca/common-investment-scams.html" class="plainlarge">list of frauds and scams page</a>.</font></b></li></ul><p class="plain"></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"><b><font style="" class="plainlarge">For more information on investing, please visit our <a link="" rel="" target="_blank" href="http://fcnb.ca/savingandinvesting.html" class="plainlarge">Savings and Investing page</a>.</font></b></p><p class="plain"><b><font style="" class="plainlarge"><br></font></b></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><p class="plain"> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><font style="" class="plainlarge"><br></font></p><p class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></p><p class="plain"><b><font style="" class="plainlarge"> </font></b></p> FCNB 2019-06-12T05:55:54-07:00 How to safely use Internet banking and investing Cyber Safe: 3 Things to Look for Before You Buy a Smart Device http://fcnb.ca/pc_url_38949536 <div class="plain"><br><img width="250" align="left" src='//0104.nccdn.net/1_5/077/201/2da/2019-06-05-Things-to-look-for-before-you-buy-a-smart-device.jpg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17988122"><font style="" class="heading1">Cyber Safe: 3 Things to Look for Before You Buy a Smart Device </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Smart home assistants, virtual reality headsets, smartwatches—these are some of the hottest gifts flying off the shelves this holiday season. Before you buy a device that connects to the Internet, do your research to help protect yourself, and your gift's recipient, from falling victim to cybercrime.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>1. Only buy from companies and sites you trust</b></font></div><div class="plain"><font style="" class="plainlarge">Take the time to do some comparison shopping and ensure the company you are buying from offers smart devices with at least basic security features such as the ability to lock the device with a password.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">When buying online, stick to secure websites, with URLs that begin with “https.”</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Some warning signs that a site could be untrustworthy include:</font><ol><li class="plainlarge">Poor or unprofessional design</li><li class="plainlarge">Broken links or a disabled back button</li><li class="plainlarge">No contact information such as a phone number, email, or address</li><li class="plainlarge">No return policy</li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Research other's people experiences with the device, or with the company/site you are buying from. If the reviews are mostly poor, or mention security or privacy issues, consider shopping elsewhere.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>2. Look for security features</b></font></div><div class="plain"><font style="" class="plainlarge">An untrustworthy company could sell you a faulty device with weak, limited, or non-existent security measures. When buying a new smart device, think about what data will be collected from you, then research how the device will protect that data. At a minimum, check to see if the device will give you the option to lock the device with your own strong and unique password.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>3. Check the company's privacy policy and data-sharing practices</b></font></div><div class="plain"><font style="" class="plainlarge">All reputable connected-device vendors will have a published policy specifying the types of data collected by their device, which can include your daily routines, fitness and health habits, and personal banking and payment information. Before you buy a device, check the privacy policy and terms of use to understand what information will be collected from you, and what it will be used for.</font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><i>*Blog post from <b>Cyber Safe</b>, for more information visit: </i><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plainlarge"><i>https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</i></a></font></p> <p class="plain"><i><font style="" class="plainlarge"> </font></i></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div><div class="plain"><br></div> FCNB 2019-06-05T06:00:33-07:00 Cyber Safe: 3 Things to Look for Before You Buy a Smart Device All apps contain cyber risks http://fcnb.ca/pc_url_38943450 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17985839" src='//0104.nccdn.net/1_5/144/158/0e3/2019-06-05-All-apps-contain-cyber-risks.jpg' style="margin: 15px 15px 15px 0px;float: left" size="250" border="0">All apps contain cyber risks</font><font style="" class="plainlarge"> </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">One thing you need to remember about the Internet world – is that there is no geography. The fabric of the internet wraps around the globe and passes through geographical boundaries as if they were none. In other words – we are all sitting in the same spot in the digital world.  Which is how someone in Montreal can order McDonald’s using a <a rel="" link="" target="_blank" href="https://www.cbc.ca/news/canada/nova-scotia/halifax-mcdonald-s-app-1.4999820" class="plainlarge">Halifax resident’s app</a>. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>How to protect yourself:</b></font><font style="" class="plainlarge"> </font></div><div class="plain"><br><ul><li class="plainlarge">If you are using an app that is linked to your banking information, make sure it offers <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">multi-factor authentication.</a></li><li class="plainlarge">Create really long <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">passwords</a>. </li><li class="plainlarge">Keep passwords protected, especially in public <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38467969" class="plainlarge">Wi-Fi zones</a>. Go beyond protecting your passwords with not sharing it friends or writing it out in an email, by keeping it protected from Wi-Fi hot spots. When there is a public Wi-Fi hot spot, there is always a chance someone else could see what you are doing – all it takes is for someone to be sitting near you to have the right piece of hardware to steal your data. </li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-05-29T06:00:32-07:00 All apps contain cyber risks An ounce of prevention is worth a pound of cure http://fcnb.ca/pc_url_38939467 <p class="plain"></p><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/057/30a/10e/2019-05-22-An-ounce-of-prevention.jpg' style="margin: 15px 15px 15px 0px;float: left" height="141" size="250" border="0" daid="17983619">An ounce of prevention is worth a pound of cure</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Earlier this year, we explored what to do if you email gets hacked; today, we will discuss how to prevent it from happening. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>1. Find out if your email address has been compromised.</b> The first thing that we recommend is that you verify if your email address has been found in any of the hacked data sets. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">You can gain some insights into whether your email address has been found in any compromised data sets at <a rel="" link="" target="_blank" href="https://haveibeenpwned.com/" class="plainlarge">https://haveibeenpwned.com/</a> Make sure to check both your personal and work email addresses. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">If you email address shows up, you should change your password for whatever service or website is identified, to a unique password for each service as soon as possible. Make your password at least 12 characters long, the longer the better. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><b>2. Start using a </b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38893858" class="plainlarge"><b>password manager</b></a><b>. </b></font></div><div class="plain"><font style="" class="plainlarge"><b><br></b></font><font style="" class="plainlarge"><b>3. Turn on </b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge"><b>2-factor authentication</b></a><b> for accounts that permit it. </b></font></div><div class="plain"><font style="" class="plainlarge"><b><br></b></font><font style="" class="plainlarge"><b>4. Verify your password reset processes for important sites. </b></font><ul><li class="plainlarge">Many hackers exploit weak password reset processes to get into your account, rather than trying to hack your password directly. The next time you login to important sites, verify that your password reset processes are properly set up and secure: </li><li class="plainlarge">Make sure the email addresses they have are up-to-date, particularly any secondary email addresses. </li><li class="plainlarge">Make sure any phone numbers are up-to-date. </li><li class="plainlarge">Enable 2-factor authentication whenever possible. </li><li class="plainlarge">Avoid reset questions, the answers for which are easily determinable (such as your mother’s maiden name). If there is no other option, create a unique answer to these poor questions that only you know (for example, use your university student number as your mother’s maiden name). </li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><br></div><p class="plain"></p> FCNB 2019-05-22T06:00:28-07:00 An ounce of prevention is worth a pound of cure Online Gaming and Entertainment http://fcnb.ca/pc_url_38934056 <div class="plain"><br></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/077/0e1/16f/2019-05-29-Online-gaming-and-entertainment.jpg' style="margin: 15px 15px 15px 0px;float: left" height="176" size="250" border="0" daid="17981221">The risks of online entertainment, games and contests</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">The fun of online entertainment, games and contests can be dampened by the risks involved with these sites. But if you know the risks, you can play games online safely.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>What are the risks?</b></font><ul><li class="plainlarge">Inadvertently downloading <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s10" class="plainlarge">viruses</a>, <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s09" class="plainlarge">Trojan horses</a>, <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx#s12" class="plainlarge">worms</a>, and <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx#s08" class="plainlarge">spyware</a> contained in game downloads onto your computer.</li><li class="plainlarge">Dealing with fraudulent entertainment sites that require a credit card number to continue watching or playing. They may also pause the game mid-action and ask you to call a long distance number (and not hang up) in order to continue playing.</li><li class="plainlarge">Interacting with strangers who trick you into giving up personal information.</li><li class="plainlarge">Exploitation of security settings on your computer, giving criminals access to your information. This could lead to <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/prtct-yrslf/prtctn-dntty/index-en.aspx" class="plainlarge">identity theft.</a></li><li class="plainlarge">Dealing with real-world and online predators who lure you into giving them information about yourself. This could include inappropriate contact with children by predators posing as a child.</li><li class="plainlarge">Participating in a real-world marketplace in on online game (where you can buy high-level characters, for instance) could involve real-life criminals who are looking to steal your money. Only make credit card payments on sites you trust and don't send money transfers, cash or make payments outside of the site.</li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Find out more about <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/scms-frd/cntsts-en.aspx" class="plainlarge">online contest scams</a> and <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/prtct-yrslf/prtctn-dntty/gms-cntsts-en.aspx" class="plainlarge">Internet gaming</a>safety tips.</font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainsmall">*Blog post from <b>Cyber Safe,</b> for more information visit: <a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plainsmall">https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</a></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><br></span></font><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><span style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></span></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><font style="" class="plainlarge"><br></font></div> FCNB 2019-05-15T06:00:47-07:00 Online Gaming and Entertainment Cybersecurity while traveling http://fcnb.ca/pc_url_38927679 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17979092" src='//0104.nccdn.net/1_5/3a9/0b0/1a1/2019-05-08-Cybersecurity-while-traveling.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Cybersecurity while traveling </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">When getting ready to go on a vacation or business trip, it is important to keep in mind that you are still a target for cyber criminals. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are a few tips to keep you safe during your travels:</font><font style="" class="plainlarge"><br></font><ul><li class="plainlarge">Back up the information on your computer before you travel. That way if you lose your equipment, you won’t lose all your information.</li><li class="plainlarge">Carry your portable device in an inconspicuous bag. Flashy, branded or logo bags and expensive cases draw attention to your device. Remember to never leave your device unattended.</li><li class="plainlarge">Keep in mind that Wi-Fi networks in public places like coffee shops, libraries or airports are not secure. Never send personal information through public Wi-Fi and disable the connection when you’re not using it.</li><li class="plainlarge">Don’t announce in online status updates when you’re going away on vacation, when you’ve made a big purchase or events that mention your address. You may also want to delete online posts from friends who mention these things to avoid the possibility of your home being robbed while you’re away.</li><li class="plainlarge">Be aware of the risks when tagging the location of the photos you share on social media. This lets people know where you are. If you feel the need to tag the location of a photo, a safer option would be to post the photo with the tagged location after you’re safely home.</li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a> </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></font></div><div class="plain"><br></div> FCNB 2019-05-08T06:06:00-07:00 Cybersecurity while traveling Cyber Safe: The Internet of Things at Home http://fcnb.ca/pc_url_38919234 <div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/1d2/2a8/1e5/2019-05-01-Internet-of-things.jpg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17976717"></font></div><div class="plain"><font style="" class="heading1"><br></font></div><div class="plain"><font style="" class="heading1">Cyber Safe: The Internet of Things at Home </font></div><div class="plain"><font style="" class="heading1"><br></font></div><div class="plain"><br></div><div class="plain"><b>Internet of Things (IoT) in the Home</b></div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Entertainment systems including a television, gaming system, speakers and headphones</li><li class="plain">Heating and cooling systems such as the a thermostat, ceiling fan, carbon monoxide detector and smoke alarm, and lights</li><li class="plain">Home security systems including alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants</li><li class="plain">Smart home appliances like a refrigerator, coffee maker, oven, and vacuum</li></ul></div><div class="plain"><br></div><div class="plain"><b>loT on the Go</b></div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Connected smart cars, buses, trains, and airplanes</li><li class="plain">Wearables like a fitness tracker, watch Healthcare devices like heart and blood pressure monitors are converting to smart devices as well. Even your pet can be connected with a tracking collar.</li></ul></div><div class="plain"><br></div><div class="plain"><b>How IoT technology works</b></div><div class="plain"><br></div><div class="plain">Web-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information.</div><div class="plain"><br></div><div class="plain"><b>Why IoT is popular</b></div><div class="plain"><br></div><div class="plain">Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection.</div><div class="plain"><br></div><div class="plain"><b>What are the risks?</b></div><div class="plain"><br></div><div class="plain">With the automatic flow of information and connection between IoT devices comes a new set of cyber security risks. If you can access all your data remotely, a cybercriminal might be able to as well. The very nature of the IoT is connectivity, but with so many devices on one network, hackers could have multiple access points to your information. That's why security settings can be important. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices.</div><div class="plain"><br></div><div class="plain">Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings.</div><div class="plain"><br></div><div class="plain"><b>How a cyber attack works</b></div><div class="plain"><br></div><div class="plain">Using malware, hackers can turn devices into remote-controlled "bots”. These “bots” can be used to spread viruses and other malware, and even conduct a distributed denial-of-service (DDoS) against other systems. Once compromised, a device's camera and microphone can also be used by the hacker. In fact, some baby monitors, children's toys, as well as certain insulin pumps and pacemakers have been shown to be hackable. An added concern is that some manufacturers of smart devices reserve the right, in the terms and conditions, to store data and share it.</div><div class="plain"><br></div><div class="plain"><b>Protect yourself: #ConnectSmarter with the IoT</b></div><div class="plain"><br></div><div class="plain">As more and more everyday objects become connected IoT devices, there are simple things you can do to protect your privacy and security:</div><div class="plain"><br></div><div class="plain"><ul><li class="plain">Change the manufacturer's default user names and use strong passwords for your Wi-Fi network and smart devices. Don't use anything that could be associated with your name, address or phone number.</li><li class="plain">Enable a lock-screen password on devices.</li><li class="plain">Use up-to-date security software on your home computer and connected devices. Update operating systems of all your devices.</li><li class="plain">To limit the damage of a cyber-attack, separate your IoT devices from your main network. Ask your service provider for help to create a ‘guest' network for your IoT devices.</li><li class="plain">Understand what personal information is being collected and why it's needed before you buy IoT devices or download apps.</li><li class="plain">Turn off geolocation when it isn't needed; if an application can see your location, a hacker could too.</li><li class="plain">Set the camera and microphone off when you are not using it.</li><li class="plain">Maintain good cyber security practices (e.g. don't open attachments from people you don't know, don't use automatic login, etc.)</li></ul></div><div class="plain"><br></div><div class="plain"><i>*Blog post from </i><b><i>Cyber Safe</i></b><i>, for more information visit: </i><a rel="" link="" target="_blank" href="https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx" class="plain">https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx</a> </div><div class="plain"><br></div><div class="plain"><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html"><u>Learn more about Frauds and Scams</u></a></p> <p class="plain"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html"><u>See all Cybersecurity tips</u></a></p> <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx"><u>Learn more about how to Get Cyber Safe</u></a></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-05-01T05:50:11-07:00 Cyber Safe: The Internet of Things at Home Encrypted Flash Drives http://fcnb.ca/pc_url_38911972 <p class="plain"><b><br></b></p><p class="plain"><font style="" class="heading1"><img width="250" align="left" daid="17973400" src='//0104.nccdn.net/1_5/061/288/31d/2019-04-24-Encrypted-flash-drives.JPG' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Encrypted Flash Drives</font></p><p class="plain"><br></p><p class="plain">It can be very easy to lose a flash drive or external hard drive, especially if you are a frequent traveler.</p><p class="plain"><br></p><p class="plain">One sure way to protect your lost data from getting into the wrong hands is to store it on an encrypted flash drive/hard drive.</p><p class="plain"><b><br></b></p><p class="plain"><b>Hardware:</b> A number of manufacturers make secure flash drives that come equipped with a physical pin or fingerprint scanning.</p><p class="plain"><b><br></b></p><p class="plain"><b>Software:</b> You can use software to encrypt your external drives, making your files inaccessible to anyone without the password.</p> <p class="plain">Always make sure to do your research on any products before purchasing.</p><p class="plain"><br></p><p class="plain">You should also be careful what you plug into your computer. Never use a USB if you don’t know where it came from or what might be on it! It can be infected with malware that can even resist formatting. Don’t let curiosity get the best of you.</p><p class="plain"><br></p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plain">Learn more about Frauds and Scams</a></p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plain">See all Cybersecurity tips</a></p><p class="plain"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plain">Learn more about how to Get Cyber Safe</a></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p> FCNB 2019-04-24T04:42:23-07:00 Encrypted Flash Drives How to talk to your kids about cyber security http://fcnb.ca/pc_url_38904227 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/1a6/148/2da/2019-04-17-How-to-talk-to-your-kids-about-cyber-security.jpg' style="margin: 15px 15px 15px 0px;float: left" height="167" size="250" border="0" daid="17969353">How to talk to your kids about cyber security</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Just about everyone is online these days, including most teenagers and a growing number of young children - never has technology been so accessible, Whether it be Snapchat, Facebook, Instagram or playing games on mobile devices, cybersecurity is becoming a concern for parents. Not only does this easy accessibility make your children vulnerable, it can also expose your computer and personal information to data breaches. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">One of the best ways to protect your children from cyber threats is to educate them about the dangers and teach them to be safe online. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Here are a few tips to get the conversation started:</font></div><div class="plain"><br><ul><li class="plainlarge">Talk to them about what is <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">safe to post online</a> and what’s not. </li><li class="plainlarge">Tell them to only accept <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38400799" class="plainlarge">friend requests </a>from people they know and trust. </li><li class="plainlarge">Explain that browsing to an unsecured site (http) can disclose any information being sent. It is preferred to always go to the https version of a website, if available. </li><li class="plainlarge">Teach them about <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">strong password</a> and how to properly manage them. </li><li class="plainlarge">Teach them to never leave their device unattended. You can also set passwords for their devices and set them to auto-lock after a short period of time. </li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Additionally, here are some things parents  can do to protect themselves:</font></div><div class="plain"><br><ul><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38655730" class="plainlarge"><b>Keep a clean computer</b></a></b></li><li class="plainlarge"><b>Keep your browser and antivirus up to date</b></li><li class="plainlarge"><b><a rel="" link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge"><b>Be aware of new frauds and scams</b></a></b>: Being aware of the type of fraud that is targeting New Brunswickers is the first line of defense of fraudsters. Teaching your children the red flags of fraud can help avoid being scammed in the future. </li><li class="plainlarge"><a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38461336" class="plainlarge"><b>Never save your credit card information</b></a>: Since most children do not have a credit card, you may think they aren’t the target of financial fraud. However, if you have a family computer, their online activities could bring on a cyberattack. Make sure to never store your credit card information, not only does this keep you safer from card fraud, it also keeps your children from buying unauthorized purchases.</li><li class="plainlarge">Make it Custom: when downloading software, look for the ‘custom installation’ feature. Even the most trusted companies can leave you with more than you bargain for. This will give you the opportunity to remove any extra unwanted add-ons. </li></ul></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-04-17T06:00:14-07:00 How to talk to your kids about cyber security Password Management http://fcnb.ca/pc_url_38893858 <div class="plain"><p class="plain"><b><font style="" class="heading1"><br></font></b></p><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17965989" src='//0104.nccdn.net/1_5/24d/223/384/2019-04-10-Password-management.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Password Management </font></b></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">It is expected that by 2020, the average Internet user will have more than 200 online accounts. Much to the delight of cybercriminals, this is one of the main reasons why passwords like “password123” and “qwerty” are so popular. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">By using brute force or <a link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">social engineering tactics</a>, hackers can easily break into accounts guarded by weak passwords and steal whatever information they find. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">The good news is that you do not have to choose between convenience and a <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plainlarge">strong password</a>. A good password management tool helps you create and store highly secure passwords and easily enter them when needed. Do your research to find a product that is right for you.</font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="heading1"><font style="" class="plainlarge">Learn more about how to Get Cyber Safe</font></a></div><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-04-10T06:00:44-07:00 Password Management Wi-Fi Safety http://fcnb.ca/pc_url_38887100 <div class="plain"><br></div><div class="plain"><br></div><div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" daid="17962833" src='//0104.nccdn.net/1_5/14e/3b8/1eb/2019-04-03-Wi-Fi-Safety.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Wi-Fi Safety</font></b></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Information being transmitted over unsecure Wi-Fi (like in a hotel lobby or coffee shop) is vulnerable to being hijacked. Any information that you are sharing from your device particularly if you are using an unsecure connection could be obtained by cybercriminals.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Be cautious when using public Wi-Fi networks as they are not always secure. It is safest to use trusted Wi-Fi connections that are password protected. Turn off any feature which connects you to any open network.</font></p><p class="plain"><b><font style="" class="plainlarge"> </font></b><b><font style="" class="plainlarge"> </font></b></p><p class="plain"><b><font style="" class="customtext2"><b>Set up a guest Wi-Fi network</b></font></b></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">Do you have family coming to stay? Are your kids’ friends constantly around? If you find yourself regularly playing the role of host, you may want to consider setting up a guest Wi-Fi network. This will allow your guests to connect to the Internet without giving them full-access to your home network. This helps reduce the risk of malware spreading and it limits what information your guests can see.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge">You can set up a guest Wi-Fi network in the settings of your router, once you have logged in as an administrator, look for guest Wi-Fi network setting under “Guest Zone” or “Guest Access”, and follow the setup instructions. Please note that not all routers have this feature.</font></p><p class="plain"><font style="" class="plainlarge"> </font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font><br><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></div> FCNB 2019-04-03T06:30:09-07:00 Wi-Fi Safety Don’t be an April Fool http://fcnb.ca/pc_url_38878760 <p class="plain"><font style="" class="plainlarge"><b><font style="" class="heading1"><br></font></b></font></p><p class="plain"><font style="" class="plainlarge"><b><font style="" class="heading1"><img width="250" align="left" daid="17959391" src='//0104.nccdn.net/1_5/2e0/258/023/2019-03-27-Dont--be-an-April-Fool.jpg' style="margin: 15px 15px 15px 0px;float: left" border="0" size="250">Don’t be an April Fool</font></b></font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge">Be prepared, back up your files on March 31st. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>What is backup? </b>A backup is a second copy of all your important files – for example, your family photos, home videos, documents and emails. Instead of storing it all in one place (like your computer), you make another copy of everything and keep it somewhere safe. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>But why should I backup? </b>Losing your files is much more common that you’d think. Have you ever lost your phone or camera – devastating, right? One small accident or failure could destroy all the important information you care about and may need. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><b>How do I backup?</b> There are two common ways of backing up your files: to an external drive, or somewhere on the Internet. It’s really easy and you only need to set it up once. </font></p> <p class="plain"><font style="" class="plainlarge"> </font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <span style="" class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></span><div class="plain"><br></div><div class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></div> FCNB 2019-03-27T06:00:09-07:00 Don’t be an April Fool March 27 is SCRUB Day http://fcnb.ca/pc_url_38869932 <div class="plain"><p class="plain"><b><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/394/0c0/08d/2019-03-20-March-27-is-SCRUB-day.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="165" border="0" size="250" daid="17955673"><br></font></b></p><p class="plain"><b><font style="" class="heading1">March 27 is SCRUB Day</font></b></p> <p class="plain"> </p> <p class="plain">When did you last look over your social media photos and friends list?  On March 27th, participate in <a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plain">Get Cyber Safe’s</a> SCRUB day. </p> <p class="plain"> </p> <p class="plain">To “SCRUB” your social media profiles, simply do the following steps:</p> <p class="plain"> </p> <p class="plain"><b>S</b>et privacy options</p><p class="plain"></p><ul><ul><li class="plain">Limit the privacy setting on your social media profiles to limit who can see your posts and photos. </li></ul></ul><p class="plain"></p><p class="plain"><br></p><p class="plain"><b>C</b>hange passwords</p><p class="plain"></p><ul><ul><li class="plain">Practice good password management. Learn how by reading our post on creating strong passwords <a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38125055" class="plain">here</a>.</li></ul></ul><br><b>R</b>emove inappropriate posts<p class="plain"></p><p class="plain"></p><ul><ul><li class="plain">Delete posts that reveal personal information that could be used to harm you.</li></ul></ul><p class="plain"></p><p class="plain"><b><br></b></p><p class="plain"><b>U</b>ntag photos</p><p class="plain"></p><ul><ul><li class="plain">Untag yourself from photos you don’t want on your profile and ask the person tagging you to delete them.</li></ul></ul><p class="plain"></p><p class="plain"><b><br></b></p><p class="plain"><b>B</b>lock strangers</p><p class="plain"></p><ul><ul><li class="plain">Block follower requests and messages from people you don’t know. They may be fraudsters trying to steal your personal information.</li></ul></ul><p class="plain"></p><p class="plain"> </p><p class="plain"> </p><p class="plain"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></p></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div> FCNB 2019-03-20T06:08:05-07:00 March 27 is SCRUB Day Smart Home Safety http://fcnb.ca/pc_url_38862243 <div class="plain"><font style="" class="plainlarge"><br></font><p class="plain"><font style="" class="plainlarge"><b><span style="" class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/273/2d0/0b8/2019-03-13-Smart-Home-Safety.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="166" size="250" border="0" daid="17951370">Smart Home Safety</font></span></b></font></p><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Hot new gadgets claim to make your home smarter, more efficient and secure. In fact, if not properly secured, these devices can be turned against you. In November 2018, a woman was stalked by her ex-boyfriend using their <a rel="" link="" target="_blank" href="https://www.cbc.ca/news/technology/tech-abuse-domestic-abuse-technology-marketplace-1.4864443" class="plainlarge">smart home technology</a>. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><a rel="" link="" target="_blank" href="https://www.cbc.ca/marketplace/episodes/2018-2019/home-hack-how-safe-are-your-high-tech-security-devices" class="plainlarge">CBC Marketplace</a> did an episode on how easily your security cameras, keyless door entries, virtual assistant devices (Alexa) and even baby monitors can easily be hacked if not properly secure. </font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">We are not trying to discourage you from having these devices in your home. Our goal is to motivate you to take some security steps to ensure these types of devices are safeguarded against hackers. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">The first step is to ask yourself the following questions:</font></div><div class="plain"><br><ol><li class="plainlarge">What are you using the devices for? </li><li class="plainlarge">Do you feel comfortable putting a camera in your home? </li><li class="plainlarge">If this technology becomes compromised, what are the risks to you and your family? </li><li class="plainlarge">What are the security measures? </li></ol><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">Before purchasing any devices, make sure that the product is purchased from a reputable company, that they allow you to change the default password and a bonus to look for would be the ability to use two-factor authentication. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><font style="" class="customtext2"><b>How to secure your smart home devices:</b></font></div><div class="plain"><font style="" class="plainlarge"><span style="" class="plain"><b><br></b></span></font><ul><li class="plainlarge">Create a strong and unique password for each of your devices. Do not repeat the password. Choose a password that is over 16 characters long, that has special characters and would not be easily hacked. </li><li class="plainlarge">Change the password to your Wi-Fi and router. </li><li class="plainlarge">Learn to spot<a rel="" link="" target="_blank" href="http://fcnb.ca/common-investment-scams.html#phishing" class="plainlarge"> phishing emails</a>. Hackers are smart and could try to retrieve your password by sending you an email that looks like it’s being sent from your security camera’s company.</li><li class="plainlarge">Enable <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38791559" class="plainlarge">two-factor authentication</a> when available. </li><li class="plainlarge">Consider installing a separate router dedicated to just your IoT devices for even better security. Alternatively connect them to a separate subnet (such as a guest network if your router permits it).</li></ul><font style="" class="plainlarge"><br></font><font style="" class="plainlarge">It is up to you to learn how these devices work and how to secure them properly. </font></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p></div><div class="plain"><font style="" class="plainlarge"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script></font><br></div> FCNB 2019-03-13T06:05:24-07:00 Smart Home Safety How to protect your data on social networks http://fcnb.ca/pc_url_38855121 <div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="heading1"><img width="250" align="left" src='//0104.nccdn.net/1_5/0a9/2a8/0e3/2019-03-06-How-to-protect-your-data-on-social-networks.jpeg' style="margin: 15px 15px 15px 0px;float: left" height="141" size="250" border="0" daid="17948218">How to protect your data on social networks</font><font style="" class="plainlarge"><br></font><font style="" class="plainlarge"><br></font></div><div class="plain"><font style="" class="plainlarge">Data Privacy day (January 28th), is an opportunity to think about what we share and who we share it with on social media. It seems obvious to keep some things private, such as phone number, credit card number, mother’s maiden name, etc., but there are many other things you can do to further your protection. </font></div><div class="plain"><font style="" class="plainlarge"><br></font><ol><li class="plainlarge">Check your privacy settings and consider your needs. If you use social media for work purposes, consider creating a separate account for your personal needs. </li><li class="plainlarge">Always use strong, creative, and memorable (only to you) passwords, and never share them. </li><li class="plainlarge">Keep your mobile device lock with a pin or pattern. </li><li class="plainlarge">Be sceptical of those <a rel="" link="" target="_blank" href="http://fcnb.ca/For-What-Its-Worth.html?fb_37818530_anch=38569189" class="plainlarge">silly quizzes</a> you can find on social media (IQ, personality type, etc.). They may take you to an unsecure site. </li><li class="plainlarge">Wait until after you’ve return from your <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38508741" class="plainlarge">vacation</a> to post about it on social media. </li><li class="plainlarge">Only accept <a rel="" link="" target="_blank" href="http://fcnb.ca/cybersecurity.html?fb_38110945_anch=38400799" class="plainlarge">friend requests</a> from people you know. Even if it looks like you have friends in common, this could be a fraudster that has created a fake account trying to steal your personal information. </li><li class="plainlarge">Avoid linking your fitness apps to your social networks, such as your regular running routes. While doing fitness challenges with your friends can be motivating, you could be putting yourself at risks by publicizing when you’re not home. Share your information with friends directly, rather than in a public setting. </li></ol></div><div class="plain"><font style="" class="plainlarge"><br></font></div><div class="plain"><p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/frauds-scams.html" class="plainlarge">Learn more about Frauds and Scams</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="http://fcnb.ca/cybersecurity.html" class="plainlarge">See all Cybersecurity tips</a></font></p> <p class="plain"><font style="" class="plainlarge"><a link="" target="_blank" href="https://www.getcybersafe.gc.ca/index-en.aspx" class="plainlarge">Learn more about how to Get Cyber Safe</a><u></u></font></p><p class="plain"><br></p><p class="plain"><span displayText="Facebook" class="st_facebook_large"></span> <span displayText="Tweet" class="st_twitter_large"></span> <span displayText="LinkedIn" class="st_linkedin_large"></span> <span displayText="Email" class="st_email_large"></span> <script type="text/javascript">var switchTo5x=true;</script> <script src="http://w.sharethis.com/button/buttons.js" type="text/javascript"></script> <script type="text/javascript">stLight.options({publisher: "e727b6e4-f329-44bf-81ed-7fbcea81edbd"}); </script><br></p></div><div class="plain"><br></div> FCNB 2019-03-06T06:00:02-08:00 How to protect your data on social networks