![Cyber Security with a lock icon](/-/media/feature/westernsouthern/hero/herospacesmall/protecting-clients-cyber-hero.jpg?rev=f2cd35783eee4fd9aaa77abd0cc8bc38&la=en&h=630&w=2000&hash=A769792FF5C9D796A2B8A26BC8B91B28447AED71)
How Clients Can Protect Themselves
Tips to Boost Your Cybersecurity
![Setting up a username and password on laptop.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/strong-password.jpg?rev=78b4239f9bb74e4f92d8c982b6791c8d&la=en&h=248&mw=440&w=440&hash=94FC9E94C61574E0CB2FBA7D3824275A6F83DF99)
![Laptop updating](/-/media/feature/westernsouthern/content-blocks/lefty-righty/review-and-update-software.jpg?rev=a96d90e1dced416489fd853e60c3c9f7&la=en&h=333&mw=440&w=440&hash=312A518F928D02524C779F294C81AAE6E6C1BDA8)
![Email message warning user about using caution when opening an email from an outside organization.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/caution-tips.jpg?rev=fe28e9d02de9469981b1f4eea44d96b3&la=en&h=364&mw=440&w=440&hash=5FF88BDF59F9A35832669BBB0885B01CBAB93814)
![Businessman installs antivirus software.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/install-antivirus-software.jpg?rev=d7fdd7cca4014bccb7ffd628d89a9b2f&la=en&h=304&mw=440&w=440&hash=DB9730FD5637E7E8ECF8718EC46200BF773871AD)
![Person using two-factor authentication to Log In.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/opt-in-2-factor-authentication_revised.jpg?rev=5a6308adc57546e198438c9125e185ab&la=en&h=267&mw=440&w=440&hash=EE049E5C97962BB43CAAED427CDD8E5319B315CC)
![Person using Virtual Private Network technology on laptop computer.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/vpn-use.jpg?rev=019fe0acf46c428ba778a9e3b62ebe1b&la=en&h=293&mw=440&w=440&hash=880491C5FEFFFFA86BFE7E6818D7262DA21F1B03)
![Businessman on his tablet at the aiport.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/excercise-caution-using-public-wifi.jpg?rev=97990c3cb86341ef80fb9bce11cf7cf2&la=en&h=293&mw=440&w=440&hash=22C1364EAFCA4625D6EE4E099A5596B1C74BB9F2)
![Cloud like filing cabinet with folders stored.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/back-up-your-data.jpg?rev=ffac051606524b7cb4bfbafe3f84e9bc&la=en&h=330&mw=440&w=440&hash=9260B12F6C679EF6D9E4483102C24B607E65DE31)
![Person using mobile smartphone sending text messages.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/be-prudent-with-info-sharing-online.jpg?rev=968e2319fd544caa823ca6527944e518&la=en&h=293&mw=440&w=440&hash=33062CBE2735FE1952F7900F24C1D1482B683664)
![Financial fraud alert message on smartphone.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/monitor-accounts-and-suspicious-activity.jpg?rev=7992ad99a9f444048c2b6dd663a52d36&la=en&h=293&mw=440&w=440&hash=1B075DE9BF8F28307AF5D28EDADC0282EA661A94)
![Women reading her laptop screen with a confused look.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/be-alert-social-egineering.jpg?rev=8de7bbecba7644d791f49240d2434a93&la=en&h=332&mw=440&w=440&hash=DA6A2CCD48B9B8A379FC48CF257987EC0B5A686F)
![Person at the charging station of an airport, plugging in their phone.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/unknown-external-device.jpg?rev=01747a677ab64af69bf8ef1d86226839&la=en&h=293&mw=440&w=440&hash=F09B05A729ED63599D919817A5BCAEAC63DB8467)
Common Cyber Scams
Phishing Scams
![Email message warning user about using caution when opening an email from an outside organization.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/phishing-scams-backup.jpg?rev=1ee809e8461c40b7b1fb2210293ded82&la=en&h=278&mw=440&w=440&hash=795BCD388AD485E69A04965E180A4E493889FB66)
Malware Attacks
![Updating systems and applications](/-/media/feature/westernsouthern/content-blocks/lefty-righty/malware-attacks.jpg?rev=2779a16cee1d41d090b0f1d9343d6e81&la=en&h=209&mw=440&w=440&hash=DFDDF7DD47B58D5915B69AF839D4AF41E1EDCDEA)
Ransomware Attacks
![Ransomware attack message on laptop.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/ransomware-attacks.jpg?rev=30d8cc20f7eb47719d3975c4fd83da83&la=en&h=220&mw=440&w=440&hash=3B3D43C828AB89BEA27293CD082E050D46FC60F2)
![Cyber criminals phishing stealing private personal data, user login, password, document, email, and card.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/identity-theft.jpg?rev=44bcd2e2765c40a1ae9808719d7f5639&la=en&h=287&mw=440&w=440&hash=7F81A22C49C9F588F77CE6CF29708564E889604B)
Identity Theft
Investment Scams
![Businessman studying his laptop screen with concern.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/investment-scams.jpg?rev=b47f160976fe40fdb82979d1a5ad260f&la=en&h=287&mw=440&w=440&hash=C628630183D3327A242E427474B6E3AF394DB457)
Credit Card Fraud
![Credit cards with an open lock and chain. Protect your credit cards concept.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/credit-card-fraud.jpg?rev=31bc5e38b4b945b487921623fd0e439f&la=en&h=293&mw=440&w=440&hash=10FA4A48C20054D9F26FA0A3D9039FA48439469E)
Online Shopping Scams
![Person using their credit card information to make an online purchase via laptop.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/online-shopping.jpg?rev=96d370a8632d4aa4970db146a9e401d4&la=en&h=294&mw=440&w=440&hash=E0AC40A8E41F93DF61E640CE360B8D095FB10442)
Tech Support Scams
![Smart Phone with Application Error.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/tech-support-scams.jpg?rev=64692adac5ee499f92c65d4e089e6922&la=en&h=317&mw=440&w=440&hash=95B513E325EFBF19A01AC574920C25585D472904)
Business Email Compromise (BEC) Scams
![Businesswomen observing her laptop screen while concerned on a phone call.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/bec-business-email-scams.jpg?rev=b34581d3274848dab2e5f805500a3f12&la=en&h=293&mw=440&w=440&hash=7370097551048EC23F26ACD3F6ECBEF527C6C8F0)
Social Engineering Scams
![Person holding phone displaying an IRS scam call.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/social-engineering-scams.jpg?rev=11e306194b0f45a4984c6a928ac7d213&la=en&h=294&mw=440&w=440&hash=C81576E517BB6341C0B3C2689A5D9C0EEB08D36C)
![Phone displaying online dating site and credit card phishing. Romance and Phishing Scam Concept.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/romance-scams.jpg?rev=52cab53d4e7d46aead959d4a68c71fc9&la=en&h=288&mw=440&w=440&hash=2BAC28663F4C9C25E44271CF22C497FDFD335D1D)
Romance Scams
Practice caution with unsolicited messages
Verify with research
Do not share sensitive information
Be alert for inconsistencies
Meet in person
![Concerned man looking at his mobile phone.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/family-imposter-scam.jpg?rev=b6bb5a2aae2248478e422cd4985a6b57&la=en&h=294&mw=440&w=440&hash=6E3E6F7998D9EDEDB55F73CC594352897BC160DF)
Family Imposter Scams
Verify their identity
Evaluate the urgency
Communication channels
What to Do if You Are a Target of a Cyberattack
![Man on the phone contacting help to report a cybersecurity attack.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/contact-legal-authorities.jpg?rev=12dcf7d3e044416bbeccfdba8fafefd7&la=en&h=293&mw=440&w=440&hash=A0AB4F3CEAB7FF01401809D0ED646A31AE71D172)
1. Contact legal authorities:
![Credit cards with a closed lock. Protect your money concept.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/contact-financial-institution.jpg?rev=94b9327b97904a08aad6d8ce79fc3b7b&la=en&h=282&mw=440&w=440&hash=0B33DFD349089CD7CED42DF4C08869C28705DC1B)
2. Contact your financial institutions:
![Meter detecting risk on a low to high scale.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/assess-the-situation.jpg?rev=85f8bf5bbe784712882d0bde32e224ee&la=en&h=323&mw=440&w=440&hash=33AC8967A5C5F6316EB74595C0F45F8E36B2265E)
3. Assess the situation:
![Warning label appears in front of a new message.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/identify-the-type-of-attack.jpg?rev=ebca35e29a1041bba4f0bf7414305e4b&la=en&h=237&mw=440&w=440&hash=D298CC906B3634EB780F9D6B7310C7F7C5674029)
4. Identify the type of attack and pinpoint the instrument of attack:
![Businessman isolating a red, infected piece from a Jenga tower.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/isolate-the-exposed-device.jpg?rev=336c6ffa0ad94ae1a4387398c317f48f&la=en&h=293&mw=440&w=440&hash=18FD255BB45874858C21177FE60E393C325292C6)
5. Isolate the exposed device:
![Reset password message](/-/media/feature/westernsouthern/content-blocks/lefty-righty/create-new-password-for-accounts.jpg?rev=f2f9874d57174bb6ac93da8572a9211d&la=en&h=440&mw=440&w=440&hash=001D6251B8CAE3A18B715F81CC42383DBC3DB49F)
6. Create new passwords for your accounts:
![Phone message concerning an unauthorized credit card transaction.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/monitor-accounts-and-suspicious-activity.jpg?rev=64c15be07bcf4de0b059328e34713864&la=en&h=293&mw=440&w=440&hash=D3ABD75BDD6081844686D84A4C332B58722B79BC)
7. Review your accounts for unauthorized changes:
![Laptop message shows it is secured after running an antivirus software.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/run-a-scan-using-antivirus-software.jpg?rev=89e362df02e04449b5506f29ef2fce70&la=en&h=293&mw=440&w=440&hash=790AA5100F9AFBD3D79ECBD01A3F5CECA6E678A6)