It is important to note that you are the first line of defense in preventing cybercrime, and the best way to prevent it is by avoiding security pitfalls and quickly dealing with problems.
This section offers you simple protection tips that make a huge difference in preventing a cyberattack.
Choosing the Right Password
Passwords are now an integral part of our digital lives, and are often the keys to your most sensitive information. That is why it is essential to select passwords carefully.
The ideal password must be highly difficult for criminals to guess. It must be personalized and known only to you.
Here are some tips when choosing your password:
- Ensure it contains at least eight characters.
- Use a combination of uppercase and lowercase letters and at least one number.
- Include at least one character that is neither a letter nor a number.
- Be creative. For example, use the first letter of each word in an easy-to-remember phrase, then make your password even safer by replacing some of those letters with numbers.
- Never transmit passwords using digital media.
You will find additional tips for your online LBCDirect account below.
To protect your login information for LBCDirect, as with your other online profiles, selecting the right password is crucial. Your password should satisfy the following criteria:
A good password contains a combination of letters and numbers, and includes a minimum of eight characters.
Although it can be difficult to memorize several different passwords, it is important to select a unique password for your LBCDirect access. That way, if your password to another online service is discovered, your LBCDirect account will not also be compromised.
A valid password proves that you are indeed the person to whom an account belongs. For your own security, never reveal your password to anyone.
For more information on passwords:
Security questions are an additional step to personalizing data protection. Much like a password, answers to security questions should only be known to you.
The LBCDirect service allows you to define personalized security questions that you will need to answer when attempting to login. It is important to formulate your questions properly and to ensure the highest level of confidentiality for your answers.
By using personalized versions instead of predefined questions, such as “What city were you born in?”, you can ensure that only you will know the answers.
Ordering Your Credit Report Once a Year
Did you know that you can obtain a free copy of your credit report (“Consumer Disclosure”) from credit agencies? By doing so, you can verify any credit requests that have been made and, thus, prevent anyone from obtaining credit in your name without your knowledge.
Updating Your Computer
Malicious programs install themselves without your knowledge and act without your authorization by exploiting security weaknesses in the legitimate software that you use. These weaknesses are frequently corrected by manufacturers with software patches or updates. As such, it is imperative that you run updates regularly to protect your computer from malware.
For more information on operating systems
Using Antivirus and Antimalware Software
In addition to regularly updating your computer, using software to protect your device from viruses and malware can also prevent infection. Several software tools of this type are available online or in-store; some packages are free, while others carry a price tag. Be sure you choose a product that offers complete protection against viruses, malware and spam.
The protection software that you select should be configured to:
- monitor your computer’s activity in “real time”;
- be updated automatically and regularly;
- scan your computer periodically.
Protecting Your Wireless Network
Most Internet access is now done via a wireless network, even in private residences. When connecting to the network, always ensure that a password is required. Your wireless access device (router or modem-router supplied by your Internet service provider) must be configured with WPA or WPA2 encryption, and it must require a secret password.
In public spaces, it is preferable to access the Internet through your mobile device (LTE, 4G, 3G) rather than via wireless Wi-Fi access points. That is because public wireless access can be compromised, offer inadequate security, or be linked to malicious services that record communications.
For more information on wireless networking