Prairie Farmer Logo

How to protect your online assets from fraud

Nick Sosnowski, chief financial officer at IAA Credit Union, says a few simple steps can improve your financial cybersecurity.

Betty Haynes

December 21, 2023

3 Min Read
Cybersecurity concept with a person typing on a laptop and cybersecurity iconography
CYBERSECURITY: “My biggest advice for clicking links is that it’s always more convenient until it’s not,” says Nick Sosnowski, IAA Credit Union.Thapana Onphalai/Getty Images

Protecting online banking accounts is of the upmost importance in the digital age, as important information can easily end up in the hands of fraudsters. Nick Sosnowski, chief financial officer at IAA Credit Union, says focusing on five areas can help secure online farm assets:

1. Email security. Sosnowski says email is the master key for fraudsters to access valuable information.

“Email is the No. 1 thing you need to lock down,” he says. “If a fraudster gets access to your email, they can do just about anything — like reset your password, sign into your online banking or even email your friends and family.”

He recommends a four-faceted approach to keep email accounts secure:

A strong password. Use a different password for every account, containing a random assortment of numbers, letters and characters. 

Good security questions. Use these like a second password, with answers only the account holder would know, even considering random answers.

Multifactor authentication. These are things like an email or text code, facial or fingerprint recognition, a token generator like Microsoft Authenticator or Google Authenticator, or a physical token like YubiKey.

Password resets. Reset your passwords regularly.

2. Phone security. With access to a phone, a thief can access financial accounts, change passwords and wipe the phone completely. Securing a phone begins with strong passwords and using caution with what is stored on the phone, including social security numbers, passport information, etc.

Sosnowski says if a phone is lost, the first step is to erase the device to lock out hackers. “You have to do this quickly, because it’s essentially a race between you and thief,” he says.

  • For Apple users: Log into icloud.com/find using the Apple username and password, find the device and erase the iPhone.

  • For Android users: Log into android.com/find using the Google username and password, select the device and erase the device.

3. Social media security. Social media has become a source for hackers to collect information for fraud. Sosnowski recommends the following:

  • Set social media accounts to private.

  • Avoid social media games, quizzes, etc.

  • Don’t accept friend requests from unknown people.

4. Strong passwords. Most password compromises occur from the reuse of passwords and can create a chain reaction of compromises across accounts. Sosnowski’s top advice is to use a password manager that generates random passwords and encrypts them to keep information safe, such as:

  • Bitwarden

  • 1Password

  • Microsoft Authenticator

  • Apple Password Wallet

“I know it’s a pain, but I assure you it’s more of a pain to have all of your accounts hacked,” says Sosnowski, explaining that most hacking comes from human error from clicking fraudulent links, using poor passwords, giving away codes and oversharing personal information.

5. Further protection from hackers. Some of the most common forms of hacking are:

Phishing. This is an email that appears to be legitimate with a link to something that’s typically urgent. In just one click, hackers can steal passwords, personal information and even lock up computers. Never click the link, unless it is something you’ve been expecting from a known source.

Smishing. This is phishing via text message often shown as fraudulent credit card charges, account suspensions or FedEx delivery tracking codes. If a text message seems suspicious, call the sender directly instead of clicking links or replying to the text.

Vishing. This is voice phishing to extract key information over the phone, such as credit card numbers or multifactor authentication codes. Fraudulent caller ID and voice-cloning artificial intelligence have made vishing particularly challenging to detect. The best way to protect from vishing is to control who is on the other line by hanging up the phone and calling the source directly.

About the Author(s)

Betty Haynes

Betty Haynes is the associate editor of Prairie Farmer. She grew up on a Menard County, Ill., farm and graduated from the University of Missouri. Most recently, Betty worked for the Illinois Beef Association, entirely managing and editing its publication.

She and her husband, Dan, raise corn, soybeans and cattle with her family near Oakford , Ill., and are parents to Clare.

Betty won the 2023 Andy Markwart Horizon Award, 2022 Emerging Writer, and received Master Writer designation from the Ag Communicators Network. She was also selected as a 2023 Young Leader by the International Federation of Agricultural Journalists.

Subscribe to receive top agriculture news
Be informed daily with these free e-newsletters

You May Also Like