As Partners in Ministry

We Can Help Each Other

Fund a gift annuity and Food for the Hungry will distribute fixed payments to you or your loved one for life

Planned Giving

Automate Planned Giving with Food for the Hungry

We're delighted you stopped by to explore how Food for the Hungry can help with your charitable giving plans. Here you can see the process for giving a non-cash item. You'll also find guidance for structuring gifts through wills, trusts, business interests, gift annuities or retirement plans. We're here to serve you, whether you're thinking about how to give wisely, or you're ready to put a planned gift in place.

Where Would You Like to Begin?

Think First, Then Give

Prepare your mind and heart as you make legacy arrangements.

Learn More

Ways to Support FH

See what assets you can give and learn wise ways to give them.

Learn More

Craft Your Legacy

Make ending poverty in someone's life be part of your legacy.

Learn More

Breaking News

Phone Scams, IRAs and Tax Extensions: The IRS published multiple reminder letters this week. In IR-2017-64 the Service warned tax preparers to watch for phishing emails claiming to be from clients. The latest tactic is for a scammer to send an email to tax preparers with a "last...

Read More

Be Inspired by Other Ministry Partners

Listen to your fellow FH partners share about their legacies.

Print
Email
Subsribe to RSS Feed

Tuesday September 22, 2020

Washington News

Washington Hotline

Strong Passwords Protect Your Data

The primary method for protection of your online security is a strong password. Security experts recommend using a different password for each account. However, it is easy to use similar passwords for many accounts. A person may have passwords for social media, streaming, bank accounts and other applications. Many individuals have 40, 60 or even 100 passwords.

A weak password is an invitation for identity theft. There were over 5,000 corporate data breaches last year. Many of these security breaches exposed login information. At present, there are over 500 million stolen passwords on hacker websites.

Keep a Written List

Many individuals continue to rely on a basic written list. The list should be on paper, not on a word processor or spreadsheet. If your list is stored electronically, a hacker could gain access to it.

While the paper list requires time to maintain and must be hidden in a secure location, it is a viable method. You should keep the paper list in a locked desk drawer or cabinet. There should only be one or two individuals who know where the list is kept and have a key to the drawer or cabinet.

With your paper or electronic list, there are several rules to follow for passwords. Do not use "password" or similar words that may easily be discovered. You should not use your name, your pet's name, your street name or any common information for a password. A hacker can often acquire your name, nickname, street address and other similar information.

Passwords are typically 8 to 14 characters in length. A longer password provides better protection. The password can include upper and lower case letters, numbers and special characters.

One password should not be used on multiple accounts. If one account is compromised, the hacker could gain access to other accounts that use the same password. This is particularly the case for financial accounts.

Using the same password with a different prefix or suffix is also a potential security risk. A hacker could determine the basic password and then use multiple login efforts to guess the resulting password.

Use an Online Password Manager

Many individuals will find a password manager to be a safe and convenient alternative to a paper list. Password managers can be located using your favorite search engine. Most password managers use 256–bit encryption and SSL certificates to create a secure connection when you are entering or retrieving data.

With a password manager, you will still need to memorize one master password to open the manager. This must be a strong password with upper and lower case letters, numbers and at least one special character.

Strong passwords are an essential method for protecting your data. Using different passwords for each of your accounts, updating passwords on a regular basis and using an online password manager will greatly increase your chances of protecting your data and reducing the risk of identity theft.


Published August 21, 2020
Print
Email
Subsribe to RSS Feed

Previous Articles

Protecting Your Data from Phishing Scams

IRS to Distribute $500 Dependent Stimulus Payments

IRS Warns of "Dirty Dozen" Tax Scams - Part III

IRS Warns of "Dirty Dozen" Tax Scams – Part II

IRS Warns of "Dirty Dozen" Tax Scams

scriptsknown