Are You Safe?

So the question on many people’s minds is whether or not their private information is safe. Essentially, the answer to that question lies somewhere between “Yes”, “No” and “Maybe”. Remember, people have been trying to break, decrypt, unscramble and crack codes ever since the first secret was told. No information is 100% safe, 100% of the time, but there is a tremendous amount of work that is being done on your behalf to protect “users” information. Here at Pioneer, we take this obligation very seriously and adhere to Federal regulations to protect our member’s information. That is why we ask to see a government issued picture ID when members come in to conduct business or we ask for their security password when we talk to them on the phone. Peak Internet and the companies they work with, are also working on members behalf, as they are constantly eliminating spam and phishing emails, but that task can be daunting as the hacker’s sophistication bar is always rising.

One of the ways users can protect their information is to be careful of what they put into cyber-space. It is important to know that there is a “digital shadow” that exists on all of us and that we, as users, need to be proactive in guarding our information. One may want to think twice before uploading a questionable selfie to Facebook or to a cloud-based storage site, ala Jennifer Lawrence, Mary Elizabeth Winstead, and Scarlett Johansson. Nor should one provide their social security number to an unfamiliar website when making that online purchase.

Users need to be aware that there is a tremendous amount of data that is compiled on people, from our browsing and shopping habits to the routes we take to work. It is no coincidence that you receive advertisements similar to your web browser searches. In many cases this can be a good thing, connecting consumers to products and services that fit their lifestyles. However, this tracking can also be invasive and offensive. With that said, we should exercise some caution when we work and play on the Internet.

Below, we have compiled some tips from the experts along with some resources for you to keep up with the latest security threats and trends.

Page 2 of 3 1 2 3
0