Think of all that could possibly be discovered in your email communications—account numbers, passwords, tax information, income details, Social Security numbers—and what might happen if that information fell into the wrong hands.
Prevent fraud stemming from email account takeovers:
Secure your life online
The J.P. Morgan Cyber Top Tips details steps to take to help guard your assets and information.
Protect all of your accounts, devices and apps with strong passwords
Create strong passwords for every account and device you use online: Combine 10 to 15 upper- and lowercase letters, numbers and special characters to create strong passwords. Create a unique password for each account.
Enable two-factor authentication whenever possible
Two-factor authentication gives an account an extra layer of protection from cybercriminals. It is available from email providers and on most online banking, finance, e-commerce and social media sites. Your Client Service Team can help you enable two-factor authentication on your J.P. Morgan OnlineSM account(s).
Be wary of emails containing wire payment instructions
Before you make a payment, verify the authenticity of the request by telephone. Use a telephone number known to you or available from an independent source, not a number contained in the email. Requests for payments to overseas bank accounts or any late changes to expected wire instructions should be especially scrutinized and validated.
Add alerts to your online bank accounts
Check your account balances and transactions for fraudulent activity each day. Go to the online account setting feature of your J.P. Morgan Online, J.P. Morgan MobileSM and J.P. Morgan ACCESS® accounts. Click on alerts and follow the directions.
Please contact your J.P. Morgan Wealth Advisor with any questions or concerns.
This information is provided for educational and informational purposes only and is not intended, nor should it be relied upon, to address every aspect of the subject discussed herein. The information provided is intended to help clients protect themselves from cyber fraud. It does not provide a comprehensive listing of all types of cyber fraud activities and it does not identify all types of cybersecurity best practices. You, your company or organization is responsible for determining how to best protect itself against cyber fraud activities and for selecting the cybersecurity best practices that are most appropriate to your needs. Any reproduction, retransmission, dissemination or other unauthorized use of this document or the information contained herein by any person or entity is strictly prohibited.