1
Table of Contents
VIRTUAL SECURITY ONLINE PROTECTION
Logins and Passwords .................................................................................................................................................................................................. 4 Cyber Attacks ................................................................................................................................................................................................................. 8 Public Hotspots, Spoofing, Spying and MAC Identification ............................................................................................................................ 10
EMAIL SECURITY
Email Security, Spoofing, Phishing and Fake Links .......................................................................................................................................... 13
CLOUD COMPUTING
Drop Box, Data Storage, and iCloud ...................................................................................................................................................................... 15
SOCIAL MEDIA
Facebook, LinkedIn, and Twitter ............................................................................................................................................................................ 17
PHYSICAL SECURITY
HOME SECURITY Home Monitoring Devices ........................................................................................................................................................................................ 19 Low-Tech Security Solutions ................................................................................................................................................................................... 21
COMPUTER PROTECTION
Viruses and Malware .................................................................................................................................................................................................. 23 Hardware and Electronic Devices ........................................................................................................................................................................... 25 Encryption and Firewalls .......................................................................................................................................................................................... 27
MOBILE DEVICES
Mobile Phones .............................................................................................................................................................................................................. 29 Mobile Apps .................................................................................................................................................................................................................. 31
ATM, CREDIT, AND DEBIT CARD THEFT
Skimmers and Online Shopping ............................................................................................................................................................................... 33
PERSONAL SECURITY
IDENTITY THEFT Preventing Identity Theft ......................................................................................................................................................................................... 35 Recovering from Identity Theft ............................................................................................................................................................................... 38
TRAVEL SECURITY
Travel Security Measures .......................................................................................................................................................................................... 40
PERSONAL PROTECTION Kidnapping..................................................................................................................................................................................................................... 42 Dating Apps and Websites ........................................................................................................................................................................................ 44
SCAMS Scams Targeting Seniors ........................................................................................................................................................................................... 46
2
3
About Efficient Wealth Management
Efficient Wealth Management is a boutique wealth management practice founded in 2005 that offers personal,
private and exclusive concierge-level service for successful individuals. We are a fee-only firm, never
accepting commissions or other transaction-oriented compensation. We limit our focus to select clients for
whom we believe we can have a tremendous impact.
Using a consultative process, we work in conjunction with a team of experts to help our clients build and
preserve their wealth, plan for retirement, mitigate their income taxes, take care of their heirs, and protect
their assets.
If you feel that our wealth management process might be a fit for you, please contact us at 281-528-1200. We
will set up a discovery meeting to explore whether we should work together. If we find that we are not the
right firm for you, we will do our best to refer you to a more appropriate advisor.
To learn more, please visit our website at www.efficientwealthmanagement.com.
Intelligent Wealth Protection
Here at EWM we absolutely love helping people improve the quality of their lives. We put together the
Intelligent Wealth Protection video series and workbook to inform our clients of the many 21st century
threats. In the series of 20 short videos we cover Virtual Security, Physical Security, and Personal Security.
In this workbook we provide checklists and resources that we recommend to protect you and the people you
care about from the threats addressed in the videos.
Please see below the link to the Intelligent Wealth Protection landing page. Please feel free to share the
landing page with your friends and loved ones.
https://efficientwealthmanagement.com/iwp/
The QR Code above will send you directly to your IWP landing page which lists the 20 videos discussed in this workbook.
We recommend you download the application “Scan” to your smart devices as your QR Code and Barcode Reader, available through iTunes.
4
Online Protection
Video 1: Logins and Passwords
One of the many challenges people struggle with is keeping up with various logins and passwords used. Today, there are logins and websites for practically everything, including various work sites, checking and savings
accounts, investment accounts, and even online shopping sites. The challenge is keeping these logins in a secure location.
Storage of your user names and passwords:
Password managers are a great tool for storing all your passwords encrypted in one place. The concept
is very similar to an encrypted “safe.” Password managers allow you to have complex passwords that
you don’t need to remember. You remember one master password to log in to the password manager.
A good password manager syncs with your desktop computers, tablets, and smartphones.
Storage of the master password:
Memorize your master password. A great trick for generating a great master password is to use the
first letter of a series of words in a sentence or a title to a book. Your master password should be at
least 15 characters long and include letters, numbers, and special characters. You can substitute special
characters and letters, for example, @ ! % $.
We recommend keeping a copy of your master password in a sealed envelope in your safe deposit box
or secure location. The master password should never be written in an unsecure location.
Logins that require you to reset your password every so often:
This is not necessary if you have a password manager, but great for people who have poor password
discipline.
5
Online Protection
What happens if I’m indisposed and my family needs access?
For estate planning purposes, your heirs need to be able to obtain your master password after you die.
This will be very beneficial for your family and heirs.
Put some form of Power of Attorney language in your estate plan or some other document that
enables people to access electronic records.
Keep your password manager “master password” in a bank safe, a vault, or a safe in the house someone
can access in the event you die, you’re in a coma, you’re inaccessible, etc.
Make sure you let someone know where the password is and that he or she knows how to access it.
6
Online Protection
Checklist
Never use the same password more than once. If one password is stolen, hackers will start plugging it
in and testing it or other sites.
Make all passwords a minimum of eight characters, although longer is much better.
Use all types of keys on the keyboard, including letters, numbers, uppercase, lowercase, and special
characters, because doing so significantly increases the difficulty of guessing your password.
Make your passwords random. Do not include information that is otherwise available, like your name,
spouse’s name, pet’s name, or date of birth.
Check the strength of your passwords at www.microsoft.com/security/pc-security/password-
checker. aspx. (Password managers also have this functionality.)
Use unique passwords for each account and website. By doing so, you will remain protected in all your
other online activities when one of your favorite shopping, gaming, or news sites eventually gets
digitally compromised and your password is stolen.
Do not keep a written list of your passwords anywhere near your computer. However, keep a list of
your passwords in a secure off-site location, such as a safe deposit box, so that your family can access it
if you become disabled or die. Make sure they know where this information is located.
Consider using a password management program to generate and store your passwords securely. In
this case, store this master password in a secure off-site location.
7
Online Protection
Resources
Roboform.com (Personal and Business)
Top-rated password manager
Dual authentication
Multifactor password options
Cloudentr.com (Business)
Two-factor authentication
Granular access control
Single sign-on
Secure file sharing
Lastpass.com (Personal)
Add another layer of security with the Yubico key
Single sign-on
Add, manage, and remove users in real time
Secure notes for digital recordkeeping
1Password: https://agilebits.com (Personal)
Simple and convenient security
21st-century digital wallet, no paper required
Easy, secure sharing with family or team members
Click here to request your complimentary, full version of
Intelligent Wealth Protection