What steps can you take to maximize your own security?

  1. Develop strong passphrases, which are different than passwords. A passphrase may contain multiple symbols and spaces, is typically a long string of characters and is not grammatically correct.
  2. Create a passphrase used only for MyGuideStone® or the GuideStone Employer Access® Program (EAP).
  3. If one of your passphrases was compromised, maintaining multiple passphrases on different platforms limits the likelihood of cybercriminal success.
  4. Do not share your passphrase with anyone.
  5. GuideStone® will never ask for your passphrase via email, text or over the phone. Your passphrase is encrypted, even from GuideStone employees.
  6. Create a strong passphrase that cannot be guessed.
  7. Use upper- and lowercase letters, numbers and special characters when creating a passphrase. Do not use your name, email, birthdate or any other personal information.
  8. Avoid using sequential or repeating characters (e.g., ABCD or 7777).
  9. Change your passphrase regularly.
  10. If you change your passphrase, then older passphrases that may have been compromised without your knowledge will no longer be valid.
  11. If you haven’t changed your passphrase in a while, change your passphrase now!
  12. Update your profile with a mobile phone number.
  13. Allows for multi-factor authentication
  14. This adds an extra security step for select transactions.
  15. Enables text alerts to your phone
  16. GuideStone can immediately notify you when certain activity occurs.
  17. Enroll in Voice Biometrics.
  18. Add an additional layer of security when speaking with GuideStone.
  19. Voice Biometrics provides the same level of security as fingerprint and facial recognition technologies you already use on you cell phone, tablet and other devices.
  20. Our Voice Biometrics creates a mathematical representation of your voice. No actual recordings of your voice are kept.
  21. Call GuideStone and ask about enrolling in Voice Biometrics. The process only takes a few minutes.
  22. Safeguard your mobile device.
  23. Password-protect your device or enable biometric security (fingerprint, facial recognition, etc.) if available.
  24. Check to see if your mobile phone no longer has a network signal or allows only emergency calls.
  25. If this is the case, it may have been hacked using a technique called Subscriber Identity Module (SIM) swapping or phone porting. Contact your mobile phone carrier immediately.
  26. Ask your mobile phone provider about setting up a PIN so they can verify your identity when you contact them.
  27. Do not download suspicious apps to your phone.
  28. Keep your mobile phone operating system and apps up-to-date.
  29. Secure your email.
  30. Fraudsters often target your email accounts to steal your contact information or to read your email — including your most frequent business transactions and company relationships. If they have breached your email account, fraudsters can potentially have any email you receive copied and forwarded to them.
  31. Enable multi-factor authentication on your email account if your email provider offers it.
  32. Do not open any suspicious emails — delete them immediately and permanently.
  33. Secure your home computer.
  34. Fraudsters can install malware or viruses on your computer, allowing them to track your activity or even remotely take it over.
  35. Install antivirus software on your computer, setting up automatic updates and regular scans of your machine. Some internet providers include software as part of their service.
  36. Keep your computer operating system and other software programs up-to-date.
  37. Enable strong Wi-Fi security for your home network.
    An unsecure wireless network is an open door for fraudsters to access sensitive information about you.
  38. Ensure the network is password-protected with a strong password.
  39. Avoid sharing the password with guests, and create a separate guest network for them that you do not use.
  40. Ask your internet provider about other ways to increase security on your wireless network.
  41. Avoid public Wi-Fi access points when interacting with sensitive data such as checking email or entering login credentials. These public Wi-Fis are convenient but also vulnerable to malicious software that can steal your login credentials.
  42. Look out for suspicious or phishing emails.
  43. Mouse over the sender’s email address to confirm legitimacy.
  44. Using “phishing emails,” fraudsters will attempt to disguise their emails to look like correspondence from legitimate companies. These emails contain fraudulent internet links or malicious file attachments.
  45. Hover over links to read URL addresses before you click.
  46. Phishing emails can be hard to spot. Be careful responding to or clicking on any links unless you are sure that the email is legitimate.
  47. Navigate directly to an organization’s website through a new browser window instead of clicking on any link in the email.
  48. Report any suspicious emails you receive that claim to be from GuideStone.
  49. We may ask you to forward the email or include it as an attachment so our Security team can investigate. Let us know if you clicked on any links or entered any personal information on a website.
  50. Learn more about phishing from the Federal Trade Commission (FTC).
  51. Monitor account activity.
  52. Review your accounts at least monthly for unauthorized activity.
  53. You know your account activity better than anyone else. Contact us if you see anything unusual.
  54. Opt into security text alerts.
  55. This is the quickest way you can be notified of unauthorized activity.
  56. View your credit reports.
  57. You are entitled to a free credit report each year from each of the following three agencies: Equifax®, Experian and TransUnion®.
  58. Keep your contact information up-to-date.
  59. Updated information enables us to contact you quickly and send information to only your current address.
  60. Browse the internet safely.
  61. Log out when finished.
  62. This prevents fraud when moving from one website to another.
  63. Beware of spoofed websites.
  64. Do not click on suspicious links in an email.
  65. Use a saved bookmark or type the web address yourself.
  66. Make sure the website is “s”ecure by looking for the “s” in “https://”, which is at the beginning of most website addresses.
    HTTPS secured link GuideStone.org
  67. Look for a locked padlock next to the web address in your browser, which indicates the website certificate.
    HTTPS secured link GuideStone.org
  68. Always use the most up-to-date version of your web browser. Most browsers can be set to update automatically.
  69. Use social media networks wisely — think before you share.
    Oversharing can put personal information at risk. Social network profiles are often available to the public. Fraudsters search the internet for personal details about you. With enough personal information, fraudsters may be able to convince others that they are you. Furthermore, if you share your location or travel plans online, criminals will know when you are not at home, leaving your home at risk.
  70. Use our Investor Protection Checklist for a printable PDF document listing steps you can take to mitigate cyber fraud.