October marks Cybersecurity Awareness Month each year—the joint initiative between the U.S. Department of Homeland Security and National Cybersecurity Alliance that first launched in 2004.
One of the recurring themes over the past couple of years is that it’s easy to stay safe online.
While some cybersecurity experts suggest it’s actually easier said than done—including Grobstein Teeple’s own Erik Rasmussen and Michael Garlie—a major component of this year’s campaign is simply putting some practices into place that make Americans safer online.
To that end, Cybersecurity Awareness Month highlights four key behaviors designed to help protect your data and maintain your cybersecurity.
What are those behaviors—and what do they mean in a practical sense?
The first behavior listed by Cybersecurity Awareness Month may seem like an obvious one, but a strong password is the first line of defense against unauthorized access to your personal data.
The use of weak or easily guessed passwords remains a major vulnerability for many users. Simple words, phrases, or patterns are susceptible to brute-force attacks, where attackers systematically try all possible combinations until they stumble upon the right one.
To mitigate the risk of brute-force attacks, keep the following factors in mind:
Complexity is key. Your password should ideally be a mix of upper and lowercase letters, numbers, and special symbols, such as an @, ! or # character.
Length matters. A longer password generally means a stronger password. Aim for at least 12 characters, wherever possible.
Avoid personal information. Never use easily accessible information like birthdays, places, or names as part of your password.
Regularly change passwords. Periodically updating passwords ensures that even if a password does fall into the wrong hands, the lifespan of its usefulness is limited.
Use a password manager. Remembering a multitude of complex passwords for various online accounts can be challenging. This is where password managers play a vital role. They can generate, retrieve, and store complex passwords for multiple accounts, requiring the user to remember only one strong master password.
Even the most robust passwords can be compromised—which is where Multifactor Authentication (MFA) adds an extra layer of protection.
As a security mechanism, MFA requires users to provide two or more verification factors to gain access to an online app, personal account, or even a Virtual Private Network (VPN).
The most common types of MFA responses include:
Something you know (such as a password or Personal Identification Number)
Something you have (such as a smart card or mobile device)
Something you are (making use of biometrics, like fingerprints or facial recognition)
If an attacker does manage to steal your password, they still can’t access the account without the second verification factor—making MFA one of the most important tools you can add to your cybersecurity toolkit.
According to the Federal Bureau of Investigation, Americans lost more than $52 million to phishing scams in 2022 alone.
Phishing attacks, where cybercriminals attempt to deceive individuals into revealing sensitive information, are becoming more and more common.
They can take the form of emails, phone calls, or text messages that appear to come from trustworthy sources but aim to trick users into divulging personal data, such as passwords, credit card numbers, or other financial data.
To protect yourself from falling victim to a phishing scam, always remember to:
Be skeptical of unsolicited communication, especially if they urge immediate action. The most sophisticated phishing scams can even spoof correspondence from trusted sources, such as text messages and emails, so it pays to remain vigilant.
Check for telltale signs of phishing, such as generic greetings, spelling mistakes, or unfamiliar sender addresses.
Never click on suspicious links or download attachments from unknown sources.
When in doubt, contact the entity directly using a trusted method—such as a phone call, or separate email—rather than responding to the initial communication.
Report suspected phishing attempts to the respective organization or appropriate authorities.
When Cybersecurity Awareness Month first started in 2004, it was suggested to update your antivirus software twice a year to coincide with changing the batteries in your smoke alarms.
That advice now seems demonstrably outdated given how frequently software is updated these days. These updates, while sometimes viewed as an inconvenience, play a vital role in cybersecurity.
That’s because developers regularly patch vulnerabilities and address security gaps in newer versions of their software. As such, failing to update can leave your systems exposed to known vulnerabilities, making it much easier for attackers to gain unauthorized access.
Next time you see a prompt to update your software, don’t forget the key role it plays in cybersecurity. And don’t forget this axiom can apply to mobile devices and tablets as well.
One of the central themes of Cybersecurity Awareness Month is that it’s easy to stay safe online.
That’s true to an extent—and is helped by following the best practices listed above—although the prevalence of smart devices and ‘always on’ technology adds a degree of complexity.
“We have everything, everywhere,” explained Grobstein Teeple’s Head of e-discovery and Forensic Technology Solutions, Michael Garlie.
“A smartphone, for example, is really only secure when it’s locked.
“If you have your phone in your hand and someone walks by and snatches it from you, it’s going to remain unlocked.
“And whoever snatched it will have access to all the material stored on your phone.
“So when it comes to cybersecurity, we really do have the actual security of data at one end of the spectrum, and convenience at the other end.”
It’s a sentiment echoed by Grobstein Teeple’s Global Head of Cybersecurity and Risk Management Solutions, Erik Rasmussen, who believes that of the four best-practice behaviors listed by Cybersecurity Awareness Month campaigners, multifactor authentication and awareness of phishing scams are the two most important.
“That’s the end user,” Rasmussen explained. “That’s what encourages proper end user behavior, like applying patches and software updates,” he said.
“People need to know how to apply updates… but if you’re the Head of Human Resources or the Director of Marketing, or you’re the Chief Executive Officer or Chief Operating Officer, you’ve got a lot more to worry about than just whether your computer is updated.
“That’s really someone else’s job. But that doesn’t mean you can’t stay informed and be part of the solution.”
Grobstein Teeple offers a comprehensive range of cybersecurity solutions—both proactive and reactive—and the professional know-how and expertise to handle any issue.
We helped UHY Consulting obtain PCI PFI certification and can do likewise for your firm.
Our in-house team of highly-qualified experts can assist with any element of your cybersecurity and e-discovery needs, including digital forensics, risk management, forensic data collection, and electronically stored information.
We’re experts in cybersecurity—and you can hear more of Erik Rasmussen’s professional insights on the Future of Cyber Risk podcast.
If you need help with your cybersecurity or e-discovery, simply get in touch to book a call.
Working remotely? Don’t forget the crucial role your home cybersecurity setup plays in keeping your personal information safe and secure. We’ve ...
Do you know how to calculate business valuation accurately when there are competing interests involved? It’s a question Grobstein Teeple’s business...
Forensic accounting might not be the most traditional of services that come to mind when you think of accounting, but it’s a field Grobstein Teeple...
It’s not a topic any business owner ever wants to face, but failure to consult a bankruptcy and insolvency expert can cost you even more in the lon...
While the month of May often brings a sigh of relief for individuals who’ve just filed their income tax returns, Grobstein Teeple does more than ju...
When it comes to building a successful business, it’s key to get your accounting right. That’s the verdict from our Principal, Dimple Mehra, who...
The California Bankruptcy Forum is hosting its 36th annual insolvency conference in May and Grobstein Teeple will again be an active participant. ...
Why is business valuation important? Grobstein Teeple’s experienced business valuation experts, Kurt Stake and Will Thomsen, have the answers. W...
Howard Grobstein didn’t co-found Grobstein Teeple with the express purpose of being named one of LA's Top 100 Accountants, but it’s an accolade tha...
October marks Cybersecurity Awareness Month each year—the joint initiative between the U.S. Department of Homeland Security and National Cybersecur...
“Certain kinds of cybercrime that were considered avant garde or cutting edge in 2004 or 2005 are now daily occurrences.” That’s the verdict of...
It's Cybersecurity Awareness Month and here at Grobstein Teeple, we’re thrilled to play our part. Our Global Head of Cybersecurity and Risk Mana...
Postponed deadlines for disaster-affected taxpayers in California. The Internal Revenue Service has announced that the postponement of various t...
Brand History We grew from a desire to combine the expertise provided by a larger firm with a leaner, more flexible approach that puts our c...
Our newest partner in e-discovery & digital forensics If you’re familiar with litigation support services, chances are you’ve heard of e-dis...