Jacquelyn (Jackie) Marquardt has been named Associate Banker at the Fergus Falls Sales Office of American Federal Bank.
Jackie has been a securities-licensed Financial Advisor at a brokerage firm in Fargo, North Dakota.
Previously, she worked as a Student Success Specialist and as an Administrative Assistant at North Dakota State College of Science in Wahpeton, a Finance Specialist at Butler Machinery Company in Fargo, and a Customer Service Representative and Teller at a bank in Fargo.
Jackie earned a Bachelor of Science Degree in Finance with a minor in Women’s Studies from Minnesota State University Moorhead, and a Master’s of Business Administration from the University of Mary in Bismarck, North Dakota.
The holiday season is here, which means shopping for the latest gadget is in full swing. With the large number of discounts that are available, you may end up buying a smart device.
As impressive as the latest smartphone or gaming computer might be, ensuring you are able to properly secure these devices is more important than ever. Any device that connects to the Internet is potentially vulnerable and could become compromised.
Here are several tips to keep in mind that can help you securely configure your new devices:
Adjust Factory-Default Configurations on Hardware and Change Default Passwords
Passwords are a common form of authentication and are often the only barrier between cybercriminals and your personal information. Some Internet-enabled devices are configured with default passwords to simplify setup. However, did you know these passwords can easily be found online? To better secure your digital device, it is important to change the factory-set default password. Be sure to replace it with a strong and unique password or passphrase for each account.
Secure your Wi-Fi Network with Encryption
A home’s wireless router is the primary entrance for cybercriminals to access connected devices. To enhance your defenses, use Wi-Fi Protected Access 3 (WPA3). WPA3 is currently the strongest form of encryption for Wi-Fi. Other methods are outdated and more vulnerable to exploitation.
Double Your Login Protection
Enable multi-factor authentication (MFA) to ensure that only the person who has access to your account is you. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app, or a secure token. For instance, with an iPhone you can use your screen lock feature with a pin or password.
Disable Location Services and Remote Connectivity
Location services might allow anyone to see where you are at any given time. To secure your private information, consider disabling this feature when you are not using your device. Additionally, most mobile devices are equipped with wireless technologies such as Bluetooth that can be used to connect to other devices or computers. Consider disabling these features when not in use as well!
Safeguard Against Eavesdropping
Disconnect digital assistants, such as your Amazon Alexa, when not in use. Limit conversation near baby monitors, audio recordable toys, and digital assistants. Be sure to cover cameras on toys, laptops, and monitoring devices when they are not in use.
Do Not Broadcast Your Wi-Fi Network Name
To prevent outsiders from easily accessing your network, avoid publicizing your Wi-Fi network name, or service set identifier (SSID). All Wi-Fi routers allow users to disable broadcasting their device’s SSID. Doing so will make it more difficult for attackers to find a network. At the very least, change your SSID to something unique. Leaving it as the manufacturer’s default could allow a potential attacker to identify the type of router and possibly exploit any known vulnerabilities.
Install a Network Firewall
Install a firewall at the boundary of your home network to defend against external threats. A firewall can block malicious traffic from entering your home network and alert you to potentially dangerous activity. Most wireless routers come with a configurable, built-in network firewall that includes features such as access controls, web-filtering, and denial-of-service (DoS) defense that you can tailor to fit your networking environment. Keep in mind that some firewall features, including the firewall itself, may be turned off by default. Ensuring that your firewall is on and all the settings are properly configured will strengthen the security of your network.
Note: Your internet service provider (ISP) may be able to help you determine whether your firewall has the most appropriate settings for your particular equipment and environment.
Install Firewalls on Network Devices
In addition to a network firewall, consider installing a firewall on all computers connected to your network. Often referred to as host or software-based, these firewalls inspect and filter a computer’s inbound and outbound network traffic based on a predetermined policy or set of rules. Most modern Windows and Linux operating systems come with a built-in, customizable and feature-rich firewall. Additionally, most vendors bundle their antivirus software with additional security features such as parental controls, email protection and malicious website blocking.
Remove Unnecessary Services and Software and Install Antivirus Software
Disable all unnecessary services to reduce the attack surface of your network and devices, including your router. Unused or unwanted services and software can create security holes on a device’s system, which could lead to an increased attack surface of your network environment. Additionally, a reputable antivirus software application is an important protective measure against known malicious threats. It can automatically detect, quarantine, and remove various types of malware, such as viruses, worms, and ransomware. Many antivirus solutions are extremely easy to install and intuitive to use, allowing for automatic virus definition updates to ensure maximum protection against the latest threats.
Update and Patch Regularly
Manufacturers will issue updates as they discover vulnerabilities in their products. The perfect example being all of the update notifications you receive on your smartphones. Configuring your device to receive automatic updates makes this easier for many devices, such as computers, phones, tablets, and other smart devices. However, if you need to manually update your device, make sure you are only applying updates directly from the manufacturer, as third-party sites and applications are unreliable and can result in an infected device.
Source: The Multi-State Information Sharing and Analysis Center (MS-ISAC)