9 Tips For Keeping Your Family Safe From Cyber Attacks

9 tips for keeping your family safe from cyber attacks

During COVID-19, cyberattacks on families and businesses have increased dramatically.  The FBI has recently reported an estimated 4,000 of these attacks each day.  An increase of 3,000% compared to pre-COVID-19.  With more executives and business owners working from home, the high-net-worth community is more at risk than ever before.


Because of this increase in cyberattacks, some recommendations have been formulated for your security.

Using VPN – A VPN (Virtual Private Network) works by encrypting your data and web traffic as you access the internet. By doing so, it can mask your location by hiding your IP address and stop you from leaving online footprints. Keeping your browsing and work online safe and secure. There is a massive amount of data on personal laptops and smartphones, when connecting to public WIFI, you are at risk of that data being stolen. It is essential to use a VPN to keep your information secure.

Two-Factor Authentication – Passwords have long been used to securely gain entry to online accounts. Unfortunately, there are many flaws to using only a password for protection against hackers. Between easy to guess passwords such as “qwerty” or “123456” and password recycling (using the same password for multiple accounts). To increase added security, we suggest using two-factor authentication. Once you enter your username and password, a second request will be sent to your mobile device to confirm you are the correct person logging in. This way, even if your password becomes exposed, a hacker will still need your personal device to gain access to your accounts.

Verification – Hackers have been known to target executive assistants and employees, while using their employer’s name to request a transfer of funds or purchase gift cards. Verify all digital requests of funds or data to ensure there is no breach. We suggest all fund transfer requests be confirmed either in person or over the phone to confirm legitimacy.

Physical Security – Since a hacking attack can access integrated home security systems such as Ring.com, it is beneficial to use alarms, gated security, and other measures on separate systems not accessed by apps on your phones.

Digital Security – All home/business networks should be secured with a trusted cybersecurity software that includes anti-malware, antivirus, and firewalls.

Social Media Audits – Performing family and associates’ social media audits is essential in avoiding a potential defamation lawsuit or other attacks. Avoid letting children post real-time photos when on vacation. Make sure there is no cyber-bullying by family members.

Encrypted Passcodes – Do not use common or easily guessed passwords. Instead, use an encrypted password, which makes it much more difficult for hackers to obtain. You also want to make sure your mobile devices and laptops have secure passwords.

Update Devices – When those notifications pop up on your cell phone or laptop letting you know there is an available software update, it’s easy to delete it and continue with your day. However, it is extremely important to perform these updates as they aren’t just providing you with new features, they also update the security on your device. If you always delay performing these updates, try changing your settings to automatically update at night so your devices are secure.

Password Managers – If you are the type of person who uses a variation of the same password for multiple accounts, a password manager can make your life incredibly easier and safer. A password manager securely stores all your login information, and many times provides you with encrypted passwords for each account. This way you can have difficult to crack passwords for each account, while also making them easy for you to access.


Key Terms

Ransomware – software that blocks access to a system or data until a ransom has been paid.

Identity Theft – using someone else’s personal information to commit fraud or for financial gain

Extortion – a threat of an attack in exchange for goods, service, funds

Malware – software that is designed to corrupt, damage, or gains unauthorized access to a computer

Hacking – gaining unauthorized access to data in a computer or system

Defamation – statement that damages a person or business’s reputation


Interested in learning more? Please email us at hello@veroinsure.com or call 773-945-6000.

Vero Insurance is a niche broker with a focus on providing insurance placement and risk management services to high-income families. Here at Vero, we love to provide you with exciting and fun articles to learn more about insurance and how it impacts your life. Visit our other blogs to find more information.

While Vero does offer a wide variety of personal insurance coverages, our main coverages include: personal umbrella insuranceauto insurance, and homeowner’s insurance. To find the best coverages for you and your family, use the contact form below so you can be at ease knowing you’re covered.