shield with lock graphic

Tips for Online Safety

Stay Secure, Stay Informed.

Navigating the digital landscape should be as safe as it is seamless. At Security Bank, we prioritize online security. Explore our tips for a
cyber-smart journey - from creating robust passwords to safe online shopping. Arm yourself with knowledge and stay vigilant with your online safety.

Here are some essential tips for online safety:
It's simple really, but this is the most common mistake people make when it comes to their online security. The trick to creating a strong password is to follow these steps:

  1. Stop reusing your passwords.
  2. Aim for passwords that are at least 12 characters long.
  3. Utilize a mix of letters (uppercase and lowercase), numbers, and symbols.
  4. Avoid using words that can be found in the dictionary.
If you have trouble remembering your passwords, consider using a password manager app. Password managers provide strong encryption, which serves as a strong defense against cybercriminals. Many password managers are protected by strong encryption like Advanced Encryption Standard (AES), the industry-standard protection the U.S. government uses to protect its sensitive data. Find a password that is right for you. 
MFA is an additional layer of security beyond just a username and password. With MFA, users are required to provide multiple forms of identification to access an account or system. This typically involves something you know (your password) combined with something you have (such as a unique temporary code sent to your phone) or something you are (like a fingerprint or facial recognition). MFA significantly enhances account security by making it more challenging for unauthorized individuals to gain access.

The most important accounts you should set up MFA for would be at least your email, social media, and financial accounts.

Choosing the right MFA method often depends on user preferences, security requirements, and the specific needs of the system or application implementing the MFA request. Here are the most common MFA techniques that you can consider using:

  1. Authentication Apps - Utilize authentication apps like Google Authenticator or other popular authenticator apps for added security. These authenticator apps generate time-based one-time password (TOTP) codes used in MFA login attempts. Instead of receiving a code via SMS or email, you can use an authentication app to generate a unique code directly on your mobile device. Popular examples of authentication apps are Google Authenticator, Authy, and Microsoft Authenticator. When setting up this MFA, you link your accounts to the authentication app, and the app continually generates codes at regular intervals. Authentication apps are known for their effectiveness and convenience in implementing MFA since it's easily accessible with your phone.
  2. Biometric Authentication - Biometric authentication is a security process that uses unique biological or behavioral characteristics to verify an individual's identity. Instead of relying on traditional methods like passwords or PINs, biometric authentication uses distinctive physical or behavioral traits that are difficult to replicate. The most common mobile phone biometric authentication method is facial recognition. Some mobile phone apps have this feature integrated with their software and can be a very easy way to set up MFA for your account.
  3. Text (SMS), Phone Call, or Email Messages - A one-time code is sent to your mobile phone via SMS text/phone call or can be sent to your email. These can be a convenient way to quickly satisfy a MFA request. One of the main advantages to these type of MFA requests is that it sends a physical notification to you at the time of the login attempt. You may find this useful because if you receive an unwanted MFA request, it could be an indication that an unauthorized user is trying to log in to your account. You can then immediately change your password and investigate whether your account has been compromised.
Keeping your computer's operating system, antivirus software, and applications up to date is highly important to online security. Regular updates include security patches that protect your computer from vulnerabilities and potential cyber threats. By staying updated, you reinforce your computer's defense against malicious attacks. Updates often address software bugs and glitches, enhancing the overall stability and performance of your computer. This ensures a smoother and more reliable user experience.

Updating your computer is not just about staying current with the latest features; it's a fundamental aspect of maintaining security, stability, and optimal performance. It's a proactive step towards ensuring that your computer remains a reliable and secure tool for your digital activities.
In the expansive landscape of the digital age, the importance of a secure Wi-Fi connection cannot be overstated. It serves as the bedrock of your digital interactions, offering more than just connectivity - it provides a shield against a myriad of potential threats. Even though every router is different, here are some tips to creating your own secure Wi-Fi connection:

  1. Change the Default Router Login Credentials - Don't use the store-bought login credentials as that may be easily guessed.
  2. Enable Wi-Fi Protected Access 3 (WPA3) Encryption - This protocol provides the latest and most advanced protection against unauthorized access. Wi-Fi Protected Setup (WPS) can be turned off since WPA3 encryption method is more secure.
  3. Enable Network Encryption for Guest Wi-Fi - If your router supports it, set up a separate network for guests with it's own unique password and enable encryption to keep your main network secure.
  4. Use Media Access Control (MAC) Address Filtering - Add the MAC addresses of your devices to the routers whitelist for allowed connections.
  5. Check the Router for Updates - Regularly check for firmware updates on your router manufacturer's website and apply them to benefit from the latest security and performance patches. This may be a good time to check current and recently connected devices to verify access to authorized devices only.
  6. Consider a VPN (Virtual Private Network) - Set up a VPN on your router for an additional layer of privacy and security. A VPN creates a secure, encrypted connection between your device and a server operated by the VPN service. This encrypted "tunnel" ensures your data remains private and secure as it travels through the internet. By changing your IP address and routing your internet traffic through a VPN server, a VPN provides enhanced privacy, security and even the ability to bypass geo-restrictions. Explore the variety of reputable VPN services to discover the one that suits your needs best.
Protecting your online safety continues with conscientious management of privacy settings. Whether on social media platforms, online services, or applications, configuring these settings is your first line of defense against unwarranted intrusions. By adjusting the visibility of personal information, limiting access to specific audiences, and regularly reviewing and updating these settings, you empower yourself to control the narrative of your online presence. Privacy settings act as a digital shield, fortifying your virtual boundaries and ensuring that your sensitive data remains in trusted hands. Staying vigilant in managing your privacy settings is a proactive step towards safeguarding your personal information in an interconnected world.

  1. Review and Adjust Social Media Settings - Regularly check and update privacy settings on social media platforms (this includes limiting the visibility of personal information and adjust audience settings for posts).
  2. Regularly Visit and Review Update Privacy Policies for Sites or Apps - Be aware of what changes have been made in privacy policies as well as what new/existing data is being collected and how it's being used.
  3. Review App Permissions - Regularly audit and adjust permissions granted to mobile apps.
  4. Check Browser Privacy Settings - Adjust privacy settings in web browsers to control how cookies and tracking are handled. There are some browsers available that are top notch to privacy, such as DuckDuckGo. Do your research and find the browser that best suits your needs.
  5. Review Location-Sharing - Limit location-sharing settings on apps and devices by setting up the share location data only when necessary and with trusted individuals or services.
Online privacy and safety hinges on your ability to navigate the intricate web of settings across platforms. Regularly review and adjust privacy preferences on social media accounts, ensuring control over the visibility of personal details and limiting access to a trusted audience. Beyond social platforms, delve into application settings, fine-tuning permissions to safeguard sensitive data and minimize potential risks. In an era where personal information can be considered a digital currency, mastering your privacy settings is an essential step towards protecting yourself online. Here are some key takeaways to privacy settings:

  1. Security Reinforcement - Proper privacy settings serve as a robust defense to your personal information from unauthorized access and potential cyber threats.
  2. Control Over Visibility - Privacy settings provide you with control over the visibility of your information, allowing you to tailor your online presence and limit exposure to a trusted audience.
  3. Mitigation of Risks - Adjusting these settings can minimize the potential risks associated with data breaches, identity theft, and online harassment, creating a safer digital environment.
  4. Protection Against Exploitation - You can safeguard yourself against unwanted tracking, profiling, and exploitation (also known as social engineering), ensuring that your online activities remain within your control.
  5. Preservation of Personal Space - Properly configured privacy settings contribute to the preservation of personal space in the digital world, allowing individuals to navigate online platforms with a sense of autonomy and security.
Online shopping continues to be on the rise and many retailers offer great online deals and free doorstep delivery. Whether you use a desktop computer, laptop or a mobile device, check out these simple ways to help keep your information protected when shopping online:

  1. Don't Use Public Wi-Fi to Make Your Online Purchases - After all, the point is to be at home, so don't be tempted to make a purchase using public Wi-Fi. Using your mobile device to create a personal hotspot is also more secure than public Wi-Fi networks, even if they have a passcode.
  2. Look for Secure Webpages - Use webpages that begin with ‘https’. You’ll also know the site is secure when it features a locked padlock symbol in the browser.
    secure lock icon
  3. Whenever Possible, Shop Through the App - If you're using a mobile device, use the retailer's mobile app. This offers more protection than a mobile browser-based transaction.
  4. Read Reviews - Search engines are your friend. You will almost always be able to find a review of a shopping site.
    review graphic icon
  5. Contact the Seller - If you’re buying from an online store for the first time, use the contact details to get in touch with the seller. If you don’t get a response, stay away.
  6. Trust your Instinct - If you see an offer online that looks too good to be true, it probably is.
  7. Keep your Payment Information Safe - Never send your card numbers or payment information via email, text message, or messaging apps.
  8. Consider Card-on-File - Consider saving your Security Bank of Kansas City Debit Mastercard® with trusted online merchants in which you frequently shop. All Security Bank of Kansas City checking accounts come with a Debit Mastercard®.
Empowering yourself with knowledge on online safety is a proactive step in navigating the digital landscape securely. Here are some effective ways to educate yourself:

  1. Online Sources - You can find a plethora of content on online safety through YouTube. You can even enroll in online courses or attend webinars dedicated to cybersecurity and online safety.
  2. Stay Informed Through Blogs and Websites - Follow cybersecurity blogs, websites and authoritative sources regularly to stay updated on the latest threats, trends, and best practices in online safety.
  3. Utilize Educational Resources from Security Organizations - Explore educational resources provided by cybersecurity organizations and government agencies. They often offer guides, toolkits, software/resource recommendations, and useful tips for enhancing online security.
  4. Follow Social Media Accounts of Experts - They often share timely updates, tips, and resources to keep their audience informed.
  5. Subscribe to Newsletters - Cybersecurity organizations and experts often have regular newsletters that they send out to their audience. Regular updates delivered to your inbox can keep you informed about emerging threats and security measures.
Online safety is a continuous learning process, and staying informed is key to adapting to evolving threats. By embracing these methods, you can build a strong foundation of knowledge and skills to navigate the digital world securely.