<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; AWM</title>
	<atom:link href="https://ambassador.partners/resources/life-style/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://ambassador.partners</link>
	<description>Planning Made Personal</description>
	<lastBuildDate>Mon, 02 May 2022 17:38:56 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.2</generator>
<site xmlns="com-wordpress:feed-additions:1">143242067</site>	<item>
		<title>3 Things to Do If You Are a Victim of Cybercrime</title>
		<link>https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/</link>
					<comments>https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 02 May 2022 10:30:32 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Lifestyle]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://ambassador.partners/?p=3845</guid>

					<description><![CDATA[<p>Ah yes, my favorite topic. Cybercrime. (Can you sense the sarcasm?) We do our best, but a digital life can put us in harm’s way. If cybercrime happens to you, it’s important to know what to do and act quickly. At its best, cybercrime can wreak havoc in your life and cause a major inconvenience.<a class="moretag" href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/">&#160;  Read more &#10141; </a></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/">3 Things to Do If You Are a Victim of Cybercrime</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ah yes, my <em>favorite</em> topic. Cybercrime. (Can you sense the sarcasm?)</p>
<p>We do our best, but a digital life can put us in harm’s way.</p>
<p>If cybercrime happens to you, it’s important to know what to do and act quickly.</p>
<p>At its best, cybercrime can wreak havoc in your life and cause a major inconvenience. However, at its worst, cybercrime can lead to financial ruin and even threaten your reputation and/or personal safety.</p>
<p>What can you do?</p>
<h3><strong>Step 1: Take a deep breath and get perspective.</strong></h3>
<p>Cybercrime is a serious conflict and should not be taken lightly. You are at war with cybercriminals, who are absolutely ruthless and move fast to take advantage of their victims.</p>
<p>However, if you act quickly, you can help limit the damage of hacking and get your life back.</p>
<p>The National Cybersecurity Alliance wrote an excellent, free guide on what to do if you become a victim of cybercrime. We strongly encourage you to read through their short 2-page pamphlet.  Here is a summary of their main points:</p>
<ul>
<li>Cybercrime comes in many forms.</li>
<li>You should report cybercrime, but you need to report it to different agencies of law enforcement.</li>
<li>Gather your evidence, both paper and electronic.</li>
<li>Read through tips on specific types of cybercrime.</li>
<li>Take preventative measures against all forms of malware.</li>
<li>Read other websites about how to fight or file a complaint against cybercrime.</li>
</ul>
<h3><strong>Step 2: Let your financial institutions know what happened. </strong></h3>
<p>Call your bank, financial advisor, insurance agent, or other providers to alert them of the situation.  They might be able to offer you additional advice.</p>
<p>Consider also contacting the credit agencies and putting a fraud alert and in some cases, a credit freeze on future applications for credit in your name.  Hackers might attempt to exploit your weakness. They will use your data to fraudulently make credit card applications in your name.</p>
<h3><strong>Step 3: Change your accounts with different, more robust passwords. </strong></h3>
<p>This might seem obvious, but it’s a crucial step nonetheless. Most of us just don’t do it.</p>
<p>Change the passwords on all of your financial accounts. It’s best to keep personal information out of your passwords, so try adding symbols, numbers, and blank spaces instead.</p>
<h3><strong> </strong></h3>
<p>After the dust settles, be proactive and defend against future attacks.</p>
<p>You can put your life back together after a cyber-attack. However, you also need to think of the future.  Take additional defensive measures to make it’s much more difficult for a cybercriminal to hack you in the future.</p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/">3 Things to Do If You Are a Victim of Cybercrime</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3845</post-id>	</item>
		<item>
		<title>Our Thoughts on the LPL Financial Data Breach &#8211; November 2018</title>
		<link>https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/</link>
					<comments>https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 23:32:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Lifestyle]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[lpl data breach]]></category>
		<guid isPermaLink="false">https://ambassador.partners/?p=4058</guid>

					<description><![CDATA[<p>Some of you received a letter from LPL Financial in the last couple of weeks. If you did not, please feel free to ignore this letter. However, if you did receive a letter from LPL, we would like to share our thoughts on some disappointing news. **As a reminder, we ended our partnership with LPL<a class="moretag" href="https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/">&#160;  Read more &#10141; </a></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/">Our Thoughts on the LPL Financial Data Breach &#8211; November 2018</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Some of you received a letter from LPL Financial in the last couple of weeks. If you did not, please feel free to ignore this letter.</em></p>
<p>However, if you did receive a letter from LPL, we would like to share our thoughts on some disappointing news.</p>
<p><span style="font-size: 10pt;"><strong><span style="font-size: 12pt;">**As a reminder, we ended our partnership with LPL over a year ago to better focus on serving clients like you. Our decision to separate was partially to improve and secure our technology. </span> </strong></span></p>
<p>Unfortunately, even though we had separated from LPL, they continued to retain information on certain clients for their own compliance. Consequently, clients’ records were at the mercy of LPL’s security efforts and their third-party providers. Regulations require financial institutions, like LPL, to maintain records on all former clients for several years.</p>
<h3>Those records include personal information.</h3>
<p>The letter dated as of November 17, 2018 states: one of LPL’s providers, Capital Forensics, suffered a security breach on November 1, 2018 by an unauthorized person who “gained access to a single Capital Forensics user’s account on a third-party file-sharing system.”  Upon investigation, LPL “determined that the files included some of your personal information, including your name, account number and Social Security Number.”</p>
<p>Upon several attempts to learn more about the breach, we were unable to get specific or detailed answers that gave us comfort. LPL will not share any specific information about individual clients, as we are no longer affiliated with them. They have encouraged us to have our clients call LPL directly for more information.</p>
<p>LPL provides further details in <a href="https://lplfinancial.lpl.com/news-media/newsroom/lpl-stories/lpl-financial-takes-action-to-protect-investors-accounts.html" target="_blank" rel="noopener">this article</a>, along with a phone number for questions on free credit monitoring. They also offered our clients to use their third-party relation, AllClear Identity Repair, to monitor any account(s) that might have been impacted. We have no direct relationship with AllClear, nor have we done any due diligence on their company or services. Therefore, we don’t feel comfortable making any recommendations.</p>
<p>Our top priority is to protect your security and identity. We have written some advice in the last few months on how to prevent and deal with cybersecurity. You can read our recent <a href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/" target="_blank" rel="noopener">October blog</a> discussing some steps to consider if you become a victim of cybercrime.</p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/">Our Thoughts on the LPL Financial Data Breach &#8211; November 2018</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ambassador.partners/resources/life-style/cybersecurity/our-thoughts-on-the-lpl-financial-data-breach-november-2018/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4058</post-id>	</item>
		<item>
		<title>3 Things We Are Doing to Defend Against Hackers</title>
		<link>https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/</link>
					<comments>https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 30 Oct 2018 12:35:32 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Lifestyle]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://ambassador.partners/?p=3855</guid>

					<description><![CDATA[<p>We at Ambassador Wealth Care for You by Caring about Cybersecurity[1] You gave us a serious responsibility to take care of you. Part of that responsibility includes guarding the security of your accounts. Since we became a registered investment advisor (RIA) firm in 2017, Ambassador Wealth has invested significant resources in reviewing and upgrading security<a class="moretag" href="https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/">&#160;  Read more &#10141; </a></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/">3 Things We Are Doing to Defend Against Hackers</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>We at Ambassador Wealth Care for You by Caring about Cybersecurity</strong><span style="font-size: 12pt;"><a href="#_ftn1" name="_ftnref1">[1]</a></span></h3>
<p>You gave us a serious responsibility to take care of you. Part of that responsibility includes <a href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/">guarding the security of your accounts.</a></p>
<p>Since we became a registered investment advisor (RIA) firm in 2017, Ambassador Wealth has invested significant resources in reviewing and upgrading security measures to defend against outside intruders.</p>
<p><a href="https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/">While there are no guarantees against hacking attacks, we will do all we can to make us a difficult target for cybercrime.</a> Here are 3 key examples of how we defend against cyberattack.</p>
<h3></h3>
<h3><strong>We Care about the Security of Our IT Infrastructure</strong></h3>
<p>After conducting a comprehensive review in early 2018, we made some upgrades to our IT infrastructure. Examples include:</p>
<ul>
<li>Physical protection of our networks and servers</li>
<li>Frequent data backup both on and off premises</li>
<li>Putting our corporate website on a more secure https<a href="#_ftn2" name="_ftnref2">[2]</a> domain</li>
</ul>
<p>Additionally, we invested resources in doing a thorough vetting of our business partners. We sought to understand how well their security efforts measured up to industry standards.</p>
<h3></h3>
<h3><strong>We Ourselves Needed and Got Outside Help for Cybersecurity</strong></h3>
<p>As an RIA firm, we are one of the most highly regulated industries in America. While that imposes costs and extra work, there are some benefits as well.  One benefit is that it challenges us to think through key business issues deeply. One of those includes cybersecurity.</p>
<p>We recognized that we are not IT experts on our own. So, we brought in business partners who can use their expertise to help us.</p>
<p>One consultant monitors our networks 24/7. That includes things like backing up our data on and offsite, updating our hardware and software defenses against cyber attacks, and ongoing review of our current hardware and software needs.</p>
<p>Another consultant specializes specifically in cybersecurity for financial service companies. Their expertise has been instrumental in educating us on our role in cybersecurity.  We have instituted a continuing cybersecurity education program for our employees, which includes mock “phishing” Emails and other simulated attacks to review and upgrade our defenses. Also, we have instituted better procedures to deal with a variety of issues, including contingency planning.</p>
<h3></h3>
<h3><strong>We Enforce Firewalls around Your Money</strong></h3>
<p>Those of you who have worked with us for a while will be quite familiar with this defensive measure. While it has been around for a while, we still think it is worth mentioning.</p>
<p>Whenever someone wants money transferred from their account, you will receive a phone call from us. We do not simply comply with Email or voicemail instructions. We want to follow up with you personally to verify your identity and confirm your request.</p>
<p>In addition, do not be offended if we ask you a few personal questions to make sure it is really you. It is because we care about your security.</p>
<p>Another subtle but important point is that you cannot conduct any transactions on your My Wealth portal. It is simply a way for you to monitor balances in your accounts and to receive communication from us. That is important because it provides one less opportunity for intruders to try to gain access to your funds.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><a class="button btn-primary" href="https://ambassador.partners/#schedule-appointment">Schedule appointment</a></p>
<p>&nbsp;</p>
<p><span style="font-size: 10pt;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.techopedia.com/definition/24747/cybersecurity">https://www.techopedia.com/definition/24747/cybersecurity</a>  accessed on September 27, 2018.<br />
</span><span style="font-size: 10pt;"><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://en.wikipedia.org/wiki/HTTPS">https://en.wikipedia.org/wiki/HTTPS</a>  accessed on September 27, 2018.</span></p>
<p><span style="font-size: 10pt;"><a href="#_ftnref1" name="_ftn1"></a></span></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/">3 Things We Are Doing to Defend Against Hackers</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3855</post-id>	</item>
		<item>
		<title>7 Things You Should Do to Prevent Cybercrime from Hacking Your Life</title>
		<link>https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/</link>
					<comments>https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 03 Oct 2018 09:00:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Lifestyle]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://ambassador.partners/?p=3731</guid>

					<description><![CDATA[<p>You Might Be Vulnerable to Hackers and Cybercrime The only 2 things guaranteed in life are death and taxes. Everything else is fair game—much of which can hurt us. That being said, there are proactive measures we can take to decrease our chances and the impact of bad events happening to us or our loved<a class="moretag" href="https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/">&#160;  Read more &#10141; </a></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/">7 Things You Should Do to Prevent Cybercrime from Hacking Your Life</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>You Might Be Vulnerable to Hackers and Cybercrime</strong></h3>
<p>The only 2 things guaranteed in life are death and taxes. Everything else is fair game—much of which can hurt us.</p>
<p>That being said, there are proactive<a href="https://ambassador.partners/resources/life-style/cybersecurity/3-things-to-do-if-you-are-a-victim-of-cybercrime/"> measures we can take to decrease our chances and the impact of bad events happening to us or our loved ones.</a></p>
<p>Cybercrime (it’s like someone sneaking into your house and taking your personal information—but electronically) is one event that we all need to be on guard against.</p>
<p>To put it in perspective, the estimated loss from cybercrime ranges from $60 billion to $110 billion a year, according to the White House Council of Economic Advisers.<a href="#_ftn1" name="_ftnref1">[1]</a> Globally, software provider McAfee estimates the global market for cybercrime to be a whopping $600 billion and growing.<a href="#_ftn2" name="_ftnref2">[2]</a></p>
<p>The nasty impact of cybercrime is more than just dollars and cents. It affects the lives of real people.  Consider the massive data breach of over 140 million personal records at credit scoring agency Equifax.<a href="#_ftn3" name="_ftnref3">[3]</a> Target and the Department of Defense (DOD) made the news in the last few years for a similar problem.</p>
<p>Assuming each of these records represent a unique individual, nearly 1 out of 2 Americans alive today would be affected.</p>
<p>The reports are shocking. So, what can you do?</p>
<p>&nbsp;</p>
<h3><strong>You Can Defend Yourself from Hackers and Cybercrime</strong></h3>
<p><a href="https://ambassador.partners/resources/life-style/3-things-we-are-doing-to-defend-against-hackers/">While no one can guarantee you’ll never be hacked, there are some things you can do to make yourself a difficult target – and lower your chances of becoming a victim of cyber crimes.</a></p>
<p><a href="#_ftnref1" name="_ftn1"></a></p>
<ol>
<li>
<h3><strong><u>Protect your identity</u></strong>.</h3>
<p>FINRA has a couple of helpful checklists on protecting your identity and your finances.<a style="font-size: 16px;" href="#_ftn1" name="_ftnref1">[4]</a><span style="font-size: 16px;">  Also, develop a proactive strategy to protect your passwords.</span><a style="font-size: 16px;" href="#_ftn2" name="_ftnref2">[5] </a>Even something simple like changing your passwords often or complicating it with numbers and symbols.</li>
<li>
<h3><strong><u>Safeguard your personal computer</u></strong>.</h3>
<p>Purchase and get regular updates for your antivirus and other security software, as well as installing a physical firewall for your home network.</li>
<li>
<h3><strong><u>Don’t surf on public networks (like Starbuck’s) unless you are willing to invest in a Virtual Private Network.<br />
</u></strong></h3>
<p>Some hackers will sit in the restaurant near you and intercept your traffic (including usernames<span style="font-size: 16px;"> and passwords).  You put yourself at great risk if you access sensitive information in public, unsafe places.</span></li>
<li>
<h3><strong><u>Be careful of suspicious Emails from unfamiliar sources.<br />
</u></strong></h3>
<p>(This is one form of “<strong style="font-size: 16px;">phishing</strong><span style="font-size: 16px;">”, a popular hacker tactic to force you to divulge your personal information to intruders.)</span></li>
<li>
<h3><strong><u>Be careful of Emails that demand your personal information or passwords.<br />
</u></strong></h3>
<p>Even if they claim to be from a major vendor (such as Amazon, a bank or credit card company), verify and do not trust.  Do not give them your information.  If you really think it is legitimate, call the number for the company you know (on your credit card, not on the Email) to make sure the Email is not a forgery from a hacker.  (This is a more subtle form of “phishing”.  Don’t fall for it!)</li>
<li>
<h3><strong><u>Beware of fake requests from unfamiliar phone numbers or websites.<br />
</u></strong></h3>
<p>Let them leave a voicemail.  Check out whether the phone number or website address is legitimate by typing the name and/or phone number on Google and look for reviews.  In many cases, you will find comments that indicate they are either scams or simply aggressive telemarketers.  There is no need to call them back. Neither should you <strong style="font-size: 16px;"><u>download anything to “win a prize” or “get a free update”.</u></strong><strong><u><br />
</u></strong></li>
<li>
<h3><strong><u>Beware of phone or electronic scams even from familiar sources. Especially beware if someone you do not know offers to “repair your computer” remotely.<br />
</u></strong></h3>
<p>Unless you initiated the phone call and have complete confidence that you know the person on the other line is legitimate, do not by any means trust someone with your computer.  They might be infecting your computer to collect your personal information!</li>
</ol>
<p>&nbsp;</p>
<p style="text-align: center;"><a class="button btn-primary" href="https://ambassador.partners/#schedule-appointment">Schedule appointment</a></p>
<p>&nbsp;</p>
<p><span style="font-size: 10pt;"><a href="#_ftnref1" name="_ftn1"></a></span></p>
<p><span style="font-size: 10pt;"><a href="#_ftnref1" name="_ftn1">[1]</a> “The Cost of Malicious Cyber Activity to the U.S. Economy”, The Council of Economic Advisers, February 2018 on <a href="https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf" target="_blank" rel="noopener">https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf</a>  accessed on September 27, 2018.</span><br />
<span style="font-size: 10pt;"><a href="#_ftnref2" name="_ftn2">[2]</a> Lynette Lau, “Cybercrime ‘pandemic’ may have cost the world $600 billion last year”, CNBC, February 22, 2018, on <a href="https://www.cnbc.com/2018/02/22/cybercrime-pandemic-may-have-cost-the-world-600-billion-last-year.html" target="_blank" rel="noopener">https://www.cnbc.com/2018/02/22/cybercrime-pandemic-may-have-cost-the-world-600-billion-last-year.html</a>  accessed on September 27, 2018.</span><br />
<span style="font-size: 10pt;"><a href="#_ftnref3" name="_ftn3">[3]</a> “The Cost of Malicious Cyber Activity to the U.S. Economy”, The Council of Economic Advisers, February 2018, 14  on <a href="https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf" target="_blank" rel="noopener">https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf</a>  accessed on September 27, 2018.</span><br />
<span style="font-size: 10pt;"><a href="#_ftnref1" name="_ftn1">[4]</a> “Protect Your Identity”, FINRA on <a href="http://www.finra.org/investors/protect-your-identity" target="_blank" rel="noopener">http://www.finra.org/investors/protect-your-identity</a>  accessed on September 27, 2018.  “Safeguarding Your Financial Information: An Identity Theft Protection Checklist”, FINRA on <a href="http://www.finra.org/investors/safeguarding-your-financial-information-identity-theft-prevention-checklist" target="_blank" rel="noopener">http://www.finra.org/investors/safeguarding-your-financial-information-identity-theft-prevention-checklist</a>  accessed on September 27, 2018.</span><br />
<span style="font-size: 10pt;"><a href="#_ftnref2" name="_ftn2">[5]</a> Bree Fowler, “Tips for Better Passwords”, Consumer Reports, June 27, 2018, on <a href="https://www.consumerreports.org/digital-security/tips-for-better-passwords/" target="_blank" rel="noopener">https://www.consumerreports.org/digital-security/tips-for-better-passwords/</a>  accessed on September 27, 2018.</span></p>
<p>The post <a rel="nofollow" href="https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/">7 Things You Should Do to Prevent Cybercrime from Hacking Your Life</a> appeared first on <a rel="nofollow" href="https://ambassador.partners">AWM</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ambassador.partners/resources/life-style/7-things-to-prevent-cybercrime-from-hacking-your-life/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3731</post-id>	</item>
	</channel>
</rss>
