The Cabot Advisor Blog


Key 6: Protecting Yourself Online

Review all your credit card and financial statements as soon as they arrive or become available online. If any transaction looks suspicious, immediately contact the financial institution where the account is held. Never send account information or personally identifiable information over email, chat, or any other unsecure channel. Be suspicious of any unsolicited email requesting […]

Continue Reading

Key 5: Protecting Yourself Online

Delete any emails that include detailed financial information beyond the time it’s needed. In addition, continuously assess whether you even need to store any personal and financial information in an email account. Use secure data storage programs–such as cloud storage and/or online vaults–to archive critical data and documents. Review unsolicited emails carefully. Never click links […]

Continue Reading

Key 4: Protecting Yourself Online

Limit the amount of personal information you post on social networking sites. Never post your Social Security number (even the last four digits). Consider keeping your birth date, home address, and home phone number confidential. Consider whether you want to post information about births, children’s birthdays, or the loss of loved ones. Sharing too much […]

Continue Reading

Key 3: Protecting Yourself Online

Do not connect to the Internet via unsecured or unknown wireless networks, such as those in public locations like hotels or cybercafes. These networks may lack virus protection and are highly susceptible to attacks, so should never be used to access confidential personal data.   As cyber fraud continues to evolve, it is more critical […]

Continue Reading

Key 2: Protecting Yourself Online

Regularly reset your passwords, including those for your email accounts. avoid using common passwords across a range of financial relationships. Use a unique username for financial accounts you access online. Never use your Social Security number in any part of your login activity.   As cyber fraud continues to evolve, it is more critical than […]

Continue Reading

Cybersecurity Best Practices