With proper strategies, you may be able to maximize your opportunities and help manage stress and confusion for your loved ones. Learn the critical details to address when creating your own estate strategies. We're here to help.
With proper strategies, you may be able to maximize your opportunities and help manage stress and confusion for your loved ones. Learn the critical details to address when creating your own estate strategies. We're here to help.
Role models have a very powerful function. They shape values and behaviors in all facets of life, including our relationship with our finances. Knowing the influence they have, it’s obviously important to select the right financial role model. However, many are selected with very little consideration, if any at all. When it comes to something as important as your financial independence, you need to be confident that you’re following the right example to ensure that you and your money work together for your greater good.
There are those who are fortunate to have great people in their lives to provide an example of what to value and how to live. If this good example extends to finances, you are very fortunate indeed. However, good behavior or strong values doesn’t always guarantee a good financial role model. A generous nature doesn’t guarantee a good budgeter. Support in your youth doesn’t mean they planned well for their future. When selecting a financial role model, you need to make sure you’re selecting them based on sound financial behaviors and a relationship to their financial independence that you would like to emulate.
Oftentimes, though, many haven’t realized they have already unconsciously selected a financial role model. They may assume that they are simply reacting to circumstances happening to them. However, their response may be a direct duplication of mom’s ardent saving, dad’s faith in the stock market, or Aunt Flo’s blatant disregard for a budget. When we really stop and study our financial patterns, we realize that we have adopted many financial behaviors that may or may not be aiding us in our path to financial freedom. Without any scrutiny of these behaviors, we may be in for a rude and unfortunate awakening in the future.
Rather than unconsciously mimicking behaviors, we should be consciously selecting a financial role model. As with all decisions, be aware of whose lead you are following and what you want that to mean for your finances. Selecting the right example of financial behavior will pave the way to our goals. Don’t forget that your money and your road to financial freedom is under your control – choose wisely.
Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can cause risk since much of those details can be discovered by a simple examination of social media.
Creating strong passwords offers greater security for minimal effort. Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can
cause risk since much of those details can be discovered by a simple examination of social media.
Under Lock and Key
You can buy a small padlock for less than a dollar—but you should not count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable assets, including money and confidential information. Fortunately, everyone can learn how to make and manage stronger passwords. It is an easy way to strengthen security both at work and at home.
What Makes a Password ‘Strong’?
Let’s say you need to create a new password that’s at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first
letter, add a digit, and end with an exclamation point. The result: Strawberry1!
Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like “strawberry”) and common patterns, such as capitalizing the first letter.
Increasing a password’s complexity, randomness, and length can make it more resistant to hackers’ tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries. You can learn more about creating strong passwords in your organization’s security awareness training. Your organization may also have guidelines or a password policy in place.
Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password—even a strong one—they can often use it to access other valuable accounts.
Here is a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.
Alice did not realize the gardening forum had been hacked, and that users’ login credentials had been
leaked online. An attacker probably tried reusing Alice’s leaked password on popular sites—and
eventually got lucky.
Guarding Your Passwords & PINS. Passwords and PINS protect sensitive data and it's critical to keep them safe. Try these best practices to stay protected.
1. Do not write them down – Many make the mistake of writing passwords on post-it notes and
leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, do
not store your login information in a file on your computer, even if you encrypt that file.
2. Do not share passwords – You cannot be sure someone else will keep your credentials safe. At
work, you could be held responsible for anything that happens when someone is logged in as you.
3. Do not save login details in your browser – Some browsers store this information in unsafe
ways, and another person could access your accounts if they get your device.
4. Use a password manager – These tools can securely store and manage your passwords and
generate strong new passwords. Some can also alert you if a password may have been
compromised.
5. Never reuse passwords – Create a unique, strong password for each account or device. This
way, a single hacked account does not endanger other accounts.
6. Create complex, long passwords – Passwords based on dictionary words, pets’ names, or other
personal information can be guessed by attackers.