Locations Contact
      • Credit Cards
      • Personal Loan
      • Line of Credit
      • UH New Hire LOC
      • Auto Loan
      • Mortgages
      • Home Equity
      • Loan Rates
      • Checking
      • Debit Card
      • Savings
      • Warrior Savings
      • Stack Up Savings
      • IRA
      • Christmas Club
      • Certificates
      • Money Market
      • Savings Rates
      • Certificate Rates
      • Online Banking
      • Mobile Banking
      • Online Bill Pay
      • Mobile Wallet
      • Direct Deposit
      • Wire Transfers
      • Forms & Documents
      • Loan Review
      • Investment Services
      • Insurance
      • Zogo Financial Education
      • Quick Tips
      • Calculators
      • Home Loan Center
      • Branches
      • Shared Branching
      • ATMs
      • Campus Visits
      • What Makes Us Special
      • News and Events
      • Newsletters
      • Annual Reports
      • Contests
      • Scholarship
      • Workshops
      • Member Perks
      • Refer-A-Friend
      • Careers
      • Contact Us
Contact & Locations I Want to Join!

Cybersecurity Awareness and Prevention

  • Overview

    Cybersecurity Awareness and Prevention

    October is cybersecurity awareness month, so we will talk about common cyberattacks, up-and-coming threats, and ways to prevent them. The average cost of a data breach to a business is $3.86 million. Phishing attacks, for example, cost $17,700 per minute. Organizations of all sizes are affected by data breaches, with 63% of companies saying a hardware-level security breach may have compromised their data within the past 12 months.

    Five Common Types of Cyberattacks

    1. Malware attack
      A hacker sends a link or email attachment that, when clicked, installs software that can block access to critical network components and installs malware or other types of destructive software. After that, access the hard drive to transmit and collect data and disrupt your computer.
    2. Phishing attack
      Involves sending communication, usually through email, that impersonates a reputable source. The goal of this attack may be to steal sensitive data, such as login information and credit card information.
    3. Man-in-the-middle attack
      Occurs when a hacker infiltrates a two-party transaction with the intent to filter and steal data. Common entry points for this type of attack include unsecured public Wi-Fi and software installed on a victim’s device.
    4. SQL (structured query language) injection
      Involves inserting malicious code into a server to force the server to reveal sensitive information. The cybercriminal may enter malicious code into a website search box to carry out this type of attack.
    5. Zero-day exploit attack
      Is when hackers take advantage of a software security flaw to perform a cyberattack. And that security flaw is only known to hackers, meaning software developers have no clue about its existence and have no patch to fix it.

    Three Emerging Cybersecurity Threats

    1. Deepfakes
      Uses artificial intelligence technology to create an image, video, or sound that appears natural. The dangers of this threat include incriminating individuals of actions or statements they have not made.
    2. Vehicle cyberattacks
      May involve accessing vehicles to steal personal data, track an individual’s location, obtain driving histories, or take over or disable safety functions.
    3. Cloud jacking
      Is also on the rise by infiltrating systems and programs of businesses that use cloud storage to use these resources for cryptocurrency mining.

    Five Cybersecurity Tips for Individuals

    1. Strong Passwords
      A unique and original password for each account (ideally 12+ characters long and including letters, numbers, cases, and symbols). Users should also remember to update passwords every three months.
    2. Keeping up with Software Updates
      As cybercriminals often target known flaws in software to access a user’s system.
    3. Social Media Accounts to Private
      Cybercriminals may comb through social media posts in search of information commonly used in security questions, such as a pet’s name or mother’s maiden name. This avoids revealing sensitive information in posts.
    4. Virtual Private Network (VPN)
      Is an effective way to protect sensitive data, especially when accessing a public Wi-Fi network. A VPN encrypts all information transmitted by your device and helps prevent many types of cyberattacks.
    5. Early Awareness
      Teachers and parents should educate children about proper internet usage. Children and teens should know the rules and guidelines for surfing the internet and using social media.

    Reference
    https://online.maryville.edu/blog/how-to-prevent-cyber-attacks/.

Call us: (808) 983-5500

Contact Locations

Routing Number: 321379656

Careers Forms & Documents
Follow us Facebook Follow us Instagram Follow us on Youtube
  • © 2025 University of Hawai’i Federal Credit Union - All Rights Reserved
  • Privacy Policy
  • Sitemap

Federally insured by NCUA. We do business in accordance with the Federal Fair Housing Law.

UHFCU's Commitment to the Community

  • University of Hawai'i System
  • University of Hawai'i Athletics
  • Hawaii's Best Kaleo Best of UH
NCUA Equal Housing Lender

Leaving Our Website

Attention! You are now leaving the University of Hawaii Federal Credit Union website. The University of Hawaii Federal Credit Union (UHFCU) does not control the security or privacy practices used at the following website. Periodically, UHFCU's website may include information from third parties and/or links to other websites. UHFCU does not make any warranties, express or implied, regarding any third party information or links to alternate websites. In addition, UHFCU assumes no responsibility for the accuracy or reliability of the content provided by third parties. If you click "CONTINUE", an external website will be opened in a new browser window. If you click "CANCEL", you will be returned to the UHFCU website.


Bank Login

Forgot Password
Enroll

Search