Cybersecurity

As financial planners, we are trusted with some of Clients’ most personal information, and we consider it a serious responsibility to keep that information secure. Because of this, we’re committed to keeping ourselves and our Clients abreast of common scams. We use this space to...
Topics: Cybersecurity

When we think about cybersecurity, our minds typically jump to the concept of malicious software or viruses infiltrating our devices. But what if the danger doesn't come from rogue code, but from manipulating the people who use these devices? This technique is known as 'human...
Topics: Cybersecurity

Years ago, scammers were relatively easy to spot – poor grammar and dodgy names and websites were glaring red flags for fishy (or phish-y) business. Today, with the help of significant technological advances, bad actors use sophisticated techniques like social engineering to gain access to...
Topics: Cybersecurity, Financial Planning

Cyber fraud is a serious threat and constant vigilance is key. Yeske Buie takes our role in helping protect your assets very seriously, and there’s also action you can take to protect yourself and help secure your information. With the help from our team at...
Topics: Cybersecurity

True or false: You reuse at least one of your passwords? We’d guess that the answer is true! How do we know that’s likely? According to the Identity Theft Resource Center, 85% of the population reuses passwords – sometimes under the guise of variations. Spoiler...
Topics: Cybersecurity

We’ve used this space before to bring your awareness to phishing and smishing campaigns that can expose your personal information, and today we’re writing to share about vishing campaigns. Vishing, or voice phishing, refers to scams conducted via phone, and we’ve recently learned of a...
Topics: Cybersecurity

A few years ago, we wrote about the rise of imposter scams reported by the Federal Trade Commission. Revisiting this piece a few years later, we’re struck by two things: many of the best practices on information security remain true, but the nature of the...
Topics: Cybersecurity