Got Backups?

Got Backups?

BACKUP YOUR COMPUTER. EXPERT TIPS.

If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware may infect and wipe or encrypt your files. At times like these, backups are often the only way you can rebuild your digital life.

Backups are copies of your information stored somewhere other than on your computer or mobile device. When you lose, or cannot access, valuable data on your device, you can recover your data from backups.

Many of the files we create today are already automatically stored and backed-up in the cloud, such as Microsoft Word documents stored in Microsoft OneDrive, Dropbox, or Google Drive, or personal photos stored in Apple iCloud. But there may be files you create that are not automatically stored in the cloud; or perhaps you want additional backups for personal use.

What, When, and How

The first step is deciding what you want to back up: (1) specific data that is important to you; or (2) everything, perhaps including your entire operating system. Many backup solutions are configured by default to use the first approach and only back up the most commonly used folders. If you are not sure what to back up or want to be extra careful, consider backing up everything.

Second, decide how frequently to back up the data. Built-in backup programs such as Apple’s Time Machine or Windows Backup and Restore allow you to create an automatic “set it and forget it” schedule. Common scheduling options include hourly, daily, and weekly. Other solutions may offer “continuous protection” in which files are immediately backed up as they are edited or saved. At a minimum, we recommend automated daily backups of critical files.

Finally, decide how you are going to back up. There are two ways: local or cloud-based backups. Local backups rely upon devices you physically control such as external USB drives or network accessible devices. The advantage of local backups is that they enable you to back up and recover large amounts of data quickly. The disadvantage is that if you become infected with malware, it is possible for the infection to spread to your backups. Also, if you have a disaster, such as fire or theft, you could lose your backups as well as your computer. If you use external devices for backups, store a copy offsite in a secure location and make sure your backups are properly labeled. For additional security, consider encrypting your backups.

Cloud-based solutions are online services that back up and store your files on the internet. Typically, you install an application on your computer. The application then automatically backs up your files either on a defined schedule or as you modify or save them. Some advantages of Cloud Solutions are their simplicity, automation of backups, and the access to files from almost anywhere. Also, since your data resides in the cloud, home disasters such as fire or theft will not affect your backup. The main disadvantage is the bandwidth it consumes. Your ability to backup and restore depends on how much data you are backing up and the speed of your network. Not sure if you want to use local or cloud-based backups? Be extra safe and use both.

With mobile devices, most of your data such as emails, text messages, or photos you take are automatically stored in the cloud. However, your mobile app configurations, system preferences, and other files may not be stored in the cloud. By automatically backing up your mobile device, not only do you preserve this information, but it is easier to transfer your data when you upgrade to a new device.

Additional Key Points

  • Regularly test that your backups are working by retrieving and opening a file.
  • If you rebuild a system from backup including the operating system, be sure you reapply the latest security patches and updates before using it again.
  • If you are using a cloud solution, select one that is easy for you to use and research the security options. For example, does your cloud backup vendor support two-step verification to secure your online account?

Backups are a simple and low-cost way to protect your digital life.

Charity and Disaster Scams

Charity and Disaster Scams

Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways to create a sense of urgency is to take advantage of a crisis. This is why cyber criminals love it whenever there is a traumatic event with global impact.

What most of us regard as a tragedy, cyber criminals view as an opportunity, such as the breakout of a war, a major natural disaster such as a volcanic explosion, and of course infectious disease breakouts like COVID- 19.

When there is an immense amount of social media and news coverage about a certain event, cyber criminals know that is the time to strike.

They use this opportunity to create timely phishing emails or scams about the event, and then send that phishing email or launch the scam to millions of people around the world. For example, during a natural disaster, they may pretend to be a charity asking for donations to save children in need. Cyber criminals can often act within hours of a crisis or disaster, as they have all the technical infrastructure prepared and are ready ahead of time. How can we protect ourselves the next time there is a big crisis or disaster, and cyber criminals seek to exploit it?

How to Detect and Defend Against These Scams

The key to avoiding these scams is to be suspicious of anyone who reaches out to you. For example, do not trust an urgent email claiming to be from a charity that desperately needs donations, even if the email appears to be from a brand that you know and trust. Do not trust a phone call claiming to be a local food bank pressuring you to donate. The greater the sense of urgency, the more likely the request is an attack. Here are some of the most common indicators of a charity scam:

  • Be very suspicious of any charity that requires that you donate via cryptocurrency, Western Union, wiring money, or gift cards.
  • Cyber criminals can change their caller ID phone number to make their phone call look like it’s from your local area code or from a trusted name. Caller ID cannot be relied upon these days.
  • Some cyber criminals will use names and logos that sound or look like a real charity. This is one reason it pays to do some research before giving.
  • Cyber criminals will often make lots of vague and sentimental claims about what they will do with your money but give no specifics about how your donation will be used.
  • Some cyber criminals may try to trick you into donating to them by thanking you for a donation you made in the past when, in reality, you never donated to them.
  • Do not assume pleas for help on crowdfunding sites such as GoFundMe or social media sites such as TikTok are legitimate, especially in the wake of a crisis or tragedy.
  • Do not give out personal or financial information in response to any unsolicited request.

How to Make a Difference Safely

To donate in times of need or to help those impacted by a disaster, donate only to well-known, trusted organizations. You initiate the connections and decide who to reach out to, such as what websites to visit or what organizations to call. When you consider giving to a charity, search its name plus words like “complaint,” “review,” “rating,” or “scam.” Not sure which charities to trust? Start by researching on government websites you trust, or perhaps links provided by a well-known and highly trusted news organization. Donating in times of need is a fantastic way to make a difference, just be sure you are giving to legitimate organizations.

Phishing Attackers Getting Trickier

Phishing Attackers Getting Trickier

PHISHING ATTACKERS GETTING TRICKIER

Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails sent by cyber attackers to trick you into doing something you should not do, such as opening an infected email attachment, clicking on a malicious link, or sharing your password.

While traditional phishing attacks continue today, many cyber attackers are creating advanced phishing emails that are more customized and harder to detect. They are also using technologies such as text messaging, social media, or even telephone calls to engage and fool you. Here are their latest tricks and how you can spot them.

Cyber Attackers Are Doing Their Research

Phishing emails used to be easier to detect because they were generic messages sent out to millions of random people. Cyber attackers had no idea who would fall victim; they just knew the more emails they sent, the more people they could trick. We could often detect these simpler attacks by looking for odd emails with “Dear Customer” in the beginning, misspellings, or messages that were too good to be true, such as Nigerian princes offering you millions of dollars

Today’s cyber attackers are far more sophisticated. They now research their intended victims to create a more customized attack. Instead of sending out a phishing email to five million people, or appearing to be generic emails sent by corporations, they may send it to just five people and tailor the attack to appear to be sent from someone we know. Cyber attackers do this by:

  • researching our LinkedIn profiles, what we post on social media, or by using information that is publicly available or found on the Dark Web.
  • crafting messages that appear to come from management, coworkers, or vendors you know and work with.
  • learning what your hobbies are and sending a message to you pretending to be someone who shares a mutual interest.
  • determining you have been to a recent conference or just returned from a trip and then crafting an email referencing your travels.

Cyber attackers are actively using other methods to send the same messages, such as texting you or even calling you directly by phone.

How to Detect These More Advanced Phishing Attacks

Because cyber attackers are taking their time and researching their intended victims, it can be more difficult to spot these attacks. The good news is you can still spot them if you know what you are looking for. Ask yourself the following questions before taking action on a suspicious message:

  1. Does the message create a heightened sense of urgency? Are you being pressured to bypass your organization’s security policies? Are you being rushed into making a mistake? The greater the pressure or sense of urgency, the more likely this is an attack.
  2. Does the email or message make sense? Would the CEO of your company urgently text you asking for help? Does your supervisor really need you to rush out and buy gift cards? Why would your bank or credit card company be asking for personal information they should already have about you? If the message seems odd or out of place, it may be an attack.
  3. Are you receiving a work-related email from a trusted coworker or perhaps your supervisor, but the email is using a personal email address such as @gmail.com?
  4. Did you receive an email or message from someone you know, but the wording, tone of voice or signature in the message is wrong and unusual?

If a message seems odd or suspicious, it may be an attack. If you want to confirm if an email or message is legitimate, one option is to call the individual or organization sending you the message with a trusted phone number.

You are by far the best defense. Use common sense.

STOP MALWARE

STOP MALWARE

STOP MALWARE

Overview

You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber criminals use to infect computers and devices. Once installed, they can do whatever they want. Learn what malware is, what danger it poses, and most importantly, what you can do to protect yourself from it.

What Is Malware?

Simply put, malware is software–a computer program–used to perform malicious actions. This term is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them. Once installed, malware can enable criminals to spy on your online activities, steal your passwords or files, or use your system to attack others. Malware can even take control of your own files, demanding that you pay a ransom to get them back. Many people believe that malware is a problem only for Windows computers. Unfortunately, malware can infect any device, from Mac computers and smartphones to DVRs and security cameras. The more computers and devices cyber criminals infect, the more money they can make. Therefore, everyone is a target, including you.

Protect Yourself – Stop Malware

You may think that all you have to do is install a security program like anti-virus software and you are safe from getting infected. Unfortunately, anti-virus cannot stop all malware. Cyber criminals are constantly developing new and more sophisticated malware that can evade detection. In turn, anti-virus vendors are constantly updating their products with new capabilities to detect malware. In many ways it has become an arms race, and the bad guys are usually one step ahead. Since you cannot rely on anti-virus alone, here are additional steps you should take to protect yourself:

  • Cyber criminals often infect computers or devices by exploiting vulnerabilities in your software. The more current your software is, the fewer vulnerabilities your systems have and the harder it is for cyber criminals to infect them. Make sure your operating systems, applications, browser and browser plugins, and devices are always updated and current. The easiest way to ensure this is to enable automatic updating whenever possible.
  • A common way cyber criminals infect computers or mobile devices is by creating fake computer programs or mobile apps, posting them on the Internet, and then tricking you into downloading and installing one. Only download and install programs or apps from trusted online stores. Also, stay away from mobile apps that are brand new, have few positive reviews, are rarely updated, or have been downloaded by a small number of people. No longer using a computer program or mobile app? Delete it.
  • Cyber criminals often trick people into installing malware for them. For instance, they might send you an email that looks legitimate and contains an attachment or a link. Perhaps the email appears to come from your bank or a friend. However, if you were to open the attached file or click on the link, you would activate malicious code that installs malware on your system. If a message creates a strong sense of urgency or seems too good to be true, it could be an attack. Be suspicious, common sense is often your best defense.
  • Regularly back up your system and files to Cloud-based services, or store your backups offline, such as on disconnected external drives. This protects your backups in case malware attempts to encrypt or erase them. Backups are critical. They are often the only way you can recover from a malware infection.

Ultimately, the best way to defend against malware is to keep all your software and devices up-to-date, install trusted anti- virus software when possible, and be alert for anyone attempting to trick you into infecting your own system. When all else fails, regular backups are often the only way you can recover.

The Community Bank

The Community Bank

THE COMMUNITY BANK

THE COMMUNITY BANK

If you’re evaluating your current banking relationship, or you’re in the market for a new bank, you should strongly consider a community bank. While we have our own opinions here at First American State Bank, we have complied some research so we may provide an objective look at the world of community banking. Community banks may not be right for every situation, but chances are they’re the right choice for your personal or small business banking needs.

What Is a Community Bank?

Community banks are generally defined as those with less than $10 billion in assets. The FDIC also describes community banks as providing traditional banking services in local communities, obtaining deposits locally and providing many of their loans to local businesses.

The FDIC’s 2020 Community Banking Study said community banks play a critical role in providing access to credit in several key areas of the U.S. economy, particularly through lending to support commercial real estate, small businesses and agriculture.

Additionally, community banks tend to be more likely to be privately owned and locally controlled, unlike larger publicly traded banks owned by stockholders.

Community bank employee are generally considered “relationship bankers” who have close ties with their customers and special knowledge and expertise of their local communities. While not generally a rule, they may have less-structured underwriting guidelines for credit decisions than big banks may, making it possible for consumers and small businesses to get approved for credit that may not meet the predetermined characteristics of larger bank programs.

As of January of 2020, the U.S. had nearly 5,000 community banks with more than 29,000 branches throughout the country. Community banks represent 15% of the banking industry’s total loans but make 36% of all small business loans and 70% of all agricultural loans. If you’re a small business owner, a farmer or live in a small town, community banks may be a big part of the backbone of your local economy.

You can use the FDIC’s Community Bank Search tool to see if your bank meets the FDIC’s definition of “community bank.”

What Community Banks Offer

If you’re trying to decide where to do your banking, many community banks offer key benefits and perks that may be a deciding factor in selecting your banking institution.

  • Better Deposit Rates

Community banks may be willing to offer more favorable interest rates on financial products compared to a big national bank. Higher CD rates and savings accounts offerings can be found at what could be defined as community banks.

  • Flexibility

Community banks are focused on personal relationships in local communities and may have less-formalized processes, compared to corporate banks when considering credit requests. You may find that community banks offer a bit of extra flexibility in working with you, compared to a larger bank with stricter guidelines for lending.

  • Personal Attention

You’ll  find that a community bank is more customer-facing, offering more personal service than a big bank. The 2019 Small Business Credit Survey, a collaboration of the 12 Federal Reserve Banks, found that 79% of small business owners who applied for credit from a small bank were satisfied with the customer experience, compared to only 67% of applicants at large banksAt First American State Bank you’ll get a real person when you call, and chances are that whether on the phone or in person we will know who you are.

  • Community Investment

Community Banks are invested in their communities, employing those who live there and serving through credit needs for neighboring businesses and individuals and actively participating through charitable action and involvement.  Progress and achievement in the community represents success for the bank.

Community Banks vs. Big Banks

In recent years, the number of community banks has declined faster than larger banks. Between 2012 and 2019, the number of community banks decreased from 6,802 to 4,750, a decline of 2,052 banks (30%).  During those years, the number of larger non-community banks declined from 555 to 427, a decline of only 128 institutions.  Community banks aren’t disappearing altogether, but have been consolidated into larger entities. Good news – among the community banks that closed during this time frame, two thirds were acquired by other community banks.  We strongly believe there should always be a place for community banking.

It used to be that national banks had an advantage in the size of their distribution network, through locations or ATMs.  With recent tech advances, smaller institutions are improving offerings through fintech partnerships, resulting in greater depth of product and service offerings not previously available, those distinctions are becoming less apparent.  For all but the most complex needs and wealth management advisory services, community banks have available most services to satisfy typical business and consumer demands.

Bottom Line

Community banks are a vital part of the U.S. economy, providing loans and deposit accounts to millions of customers. Although they are known for their local presence and personal relationships, community banks are more than brick-and-mortar branches—many community banks are innovating and investing in new digital technology, but people ultimately make community banks successful.

If you’re looking to open any variety of bank accounts, loans for business or personal needs,  a new home base for your personal or small business finances, and services to grow with you moving forward, consider a community bank, First American State Bank.