Online holiday shopping is expected to reach a peak of $910 billion in 2021—a cybercriminal’s jackpot after a record-breaking year of cybersecurity breaches like Colonial Pipeline and Kaseya. Shoppers overwhelmed by stress, and retailers distracted by supply chain challenges and staffing shortages will undoubtedly be more susceptible to phishing attempts and other social engineering attacks this year. Cybercriminals don’t take time off—and neither should your cybersecurity measures. Individual shoppers and business leaders must stay alert and proactive to protect themselves—now—before it’s too late. Here are six ways to protect your data now and in the future. Beware of phishing scams Phishing attempts can range from unsolicited emails posing as charitable organizations to bogus package delivery confirmations. People naturally expect to receive a lot of packages during the holiday season and hackers take advantage of this by pretending to be companies like FedEx, UPS, and Amazon to trick victims into giving them personal information that they can use for their gain. Stay on high alert to avoid falling prey to malicious actors’ ploys to steal your private information. Be smart about where you spend To reduce the risk of your data being compromised, buy from merchants you already know and trust. Promotional advertisements claiming to offer incredible deals can be enticing, but you should go straight to a trusted merchant’s main website to make purchases instead of clicking on links you find in emails and on social media. Use a password manager Strong, unique passwords are your first line of defense against cybercriminals breaking into your online accounts and stealing your personal data. A password manager gives you a secure place to store all your passwords, and it gives you easy access to them when you need them. Don’t use public Wi-Fi For online holiday shopping, use a secure cell phone signal, or simply shop from the comfort of your home. If a public network isn’t secure, and you log in to an unencrypted site, other users on the network can see what you type—including payment information and passwords. Enable Multi-Factor Authentication (MFA) More commonly known as Two-Factor Authentication (2FA), MFA is an authentication method that requires a user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. By requiring one or more additional verification factors, you decrease the likelihood of a successful cyber attack. Check your applications and accounts to see if 2FA is available (it’s commonly in the form of an SMS code sent to verify your identity) and use it everywhere you can. Update your software It’s easy to procrastinate on software updates because they can take up valuable time, and they might not seem important. Unfortunately, skipping patches is a big mistake that keeps the door open for hackers to access private information, putting you at risk for identity theft and more. Though updating your software can feel like a boring workflow disruption, trust me, it’s worth making the time. During the season of giving it’s especially important to make sure you’re not giving away sensitive data to scammers. Put these six strategies to work and you’ll be on the road to ensuring your data is secure all year long.
Caroline Wong is the chief strategy officer at Cobalt, a global, remote-first cybersecurity company with a focus on Pentest as a Service (PtaaS).
Login to add comment
Other posts in this group
![This DARPA-backed startup banked $100 million for its energy-slashing analog chips](https://www.cdn5.niftycent.com/a/k/J/B/l/v/5/this-darpa-backed-startup-banked-100-million-for-its-energy-slashing-analog-chips.webp)
A young DARPA-backed startup with a fresh spin on a low-power computer chip has raised over $100 million in a Series B funding round, a sign of the wild appetite for more energy-efficient ways to
![Treasury watchdog office is auditing DOGE’s access to federal government’s payment system](https://www.cdn5.niftycent.com/a/k/W/r/n/m/E/treasury-watchdog-office-is-auditing-doge-s-access-to-federal-government-s-payment-system.webp)
The Treasury Department’s Office of Inspector General on Friday said it was launching an audit of the security controls for the federal government’s payment system, after Democratic se
![A partnership between Jigsaw and this Kentucky city could be the future of civic engagement](https://www.cdn5.niftycent.com/a/k/X/r/O/V/N/a-partnership-between-jigsaw-and-this-kentucky-city-could-be-the-future-of-civic-engagement.webp)
Bowling Green, Kentucky, is known for being the city from which Corvettes roll off the production lines, and for Fruit of the Loom underwear, which is headquartered there.
But the city o
![Elon Musk’s war on USAID is a war on reality](https://www.cdn5.niftycent.com/a/e/a/a/Q/2/M/elon-musk-s-war-on-usaid-is-a-war-on-reality.webp)
On January 29, President Donald Trump celebrated the latest victory
![NASCAR 25, the new game from iRacing, will put Daytona 500 fans in the driver’s seat](https://www.cdn5.niftycent.com/a/e/b/9/g/l/a/nascar-25-the-new-game-from-iracing-will-put-daytona-500-fans-in-the-driver-s-seat.webp)
The Daytona 500 is one of the more challenging races on the
![Local history buffs are turning to Facebook to share memories of bygone eras](https://www.cdn5.niftycent.com/a/e/7/v/L/9/6/local-history-buffs-are-turning-to-facebook-to-share-memories-of-bygone-eras.webp)
Social media has a reputation for capturing ephemeral thoughts and images, but around the world, people are using Facebook for a different purpose, setting up groups to record and share images and
![Elon Musk’s DOGE team may need a crash course in COBOL](https://www.cdn5.niftycent.com/a/k/l/6/a/l/j/elon-musk-s-doge-team-may-need-a-crash-course-in-cobol.webp)