Scammers, hackers, identity thieves and other cyber-criminals spend all year long looking for ways to steal your personal and business information – and your money. Here are seven simple steps from the IRS you should take to help protect your computer in 2016, including data you have stored on the cloud.


1 | Understand and use security software

Security software helps protect your computer against digital threats online. Generally, your operating system will include security software or you can access free security software. Other options may have an annual licensing fee and offer more features.

Essential tools include:

• A firewall
• Virus/malware protection
• File encryption (if you keep sensitive financial/tax documents on your computer)

Security suites often come with firewall, anti-virus and anti-spam, parental controls and privacy protection. File encryption to protect your saved documents may have to be purchased separately.

Do not buy security software offered as an unexpected pop-up ad on your computer or email! It’s likely from a scammer.

2 | Allow security software to update automatically

Set your security software to update automatically. Malware – malicious software – evolves constantly and your security software suite is updated routinely to keep pace.

3 | Look for the “s” for encrypted “https” websites

When shopping or banking online, always look to see that the site uses encryption to protect your information. Look for https at the beginning of the web address. The “s” is for secure. Unencrypted sites begin with an http address. Additionally, make sure the https carries through on all pages, not just the sign-on page.

4 | Use strong passwords

Use passwords of at least 10 to 12 characters, mixing letters, numbers and special characters. Don’t use your name, birthdate or common words. Don’t use the same password for several accounts. Keep your password list in a secure place or use a password manager. Don’t share your password with anyone. Calls, texts or emails pretending to be from legitimate companies or the IRS asking you to update your accounts or seeking personal financial information are generally scams. (Note: At SmallBusiness.com, we also recommend using a password management system.)

5 | Secure your wireless network

A wireless network sends a signal through the air that allows you to connect to the Internet. If your home or business wifi is unsecured it also allows any computer within range to access your wireless and steal information from your computer. Criminals also can use your wireless to send spam or commit crimes that would be traced back to your account. Always encrypt your wireless. Generally, you must turn on this feature and create a password.

6 | Be cautious when using public wireless networks

Public wi-fi hotspots are convenient but often not secure. Tax or financial Information you send though websites or mobile apps may be accessed by someone else. If a public Wi-Fi hotspot does not require a password, it probably is not secure. If you are transmitting sensitive information, look for the “s” in https in the website address to ensure that the information will be secure. (More advice for using a public wifi network.)

7 | Avoid phishing attempts

Never reply to emails, texts or pop-up messages asking for your personal, tax or financial information. One common trick by criminals is to impersonate a business such as your financial institution, tax software provider or the IRS, asking you to update your account and providing a link. Never click on links even if they seem to be from organizations you trust. Go directly to the organization’s website. Legitimate businesses don’t ask you to send sensitive information through unsecured channels. (See also: “How Hackers Use Social Engineering and How to Prevent It“)

16
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

17
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

18
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

19
Why You Should Still Use a Password Management System, Even if You Heard One Was ‘Hacked’

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

20
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

21
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

22
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

23
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

24
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

25
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

26
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

27
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

28
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

29
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.