Do’s and Don’ts to Prepare for Cyber Monday

Nov 11, 2019

2 min

Cyber Monday, the online equivalent to Black Friday, is the biggest online shopping day of the year and signals the beginning of the holiday online shopping season.


Last year, Cyber Monday shoppers spent a record $7.9 billion online, according to Adobe Analytics. However, one of the significant concerns for both the consumers and the retailers is safety. According to Experian, 43 percent of consumers who had their identity stolen claimed it happened while shopping online during the holidays. For businesses, there are news stories about ransomware attacks or retailers suffering a cyber-attack and losing data.



Joseph Dalessandro, an expert and professor in information technology in Tulane University’s School of Professional Advancement, is available to speak about what shoppers should do during one of the biggest shopping days of the year. For interviews, contact pr@tulane.edu or Roger Dunaway at 504-542-2906. 


Here are Dalessandro’s eight tips to stay safe on Cyber Monday:

  • Get a password manager and let it pick and store the passwords for you. There are several good free ones out there. The most important thing in passwords is not fancy characters or cleverly replacing all “A’s” with “4’s”, it is length, pure and simple. Long passwords are hard to crack and can’t ever be guessed. For example, “This is the day the Lord has made, let us rejoice and be glad” equates to “TiTdTlHmLuRaBg” it’s 14 characters, easy to remember and harder to guess than “p4ssword” or “p4ssw0rd” or the dreaded “p4ssw0rd1”. If required to have a number, replace the first or last character with a number and don’t get overly creative. Creativity equals forgotten quickly. 
  • As a computer owner, make sure your software is always up-to-date. This takes time. Don’t wait until Monday.
  • Use anti-virus protection. If you’re spending thousands online buying stuff, then pay $70 on anti-virus software. Again, always make sure it is up-to-date.
  • Use browser plug-ins to protect privacy by stopping online tracking and unwanted code from running without your consent. This takes a little time to set up, do it now and be safer online all the time. 
  • Never click links from email. This is the No. 1 method for thieves to steal your data or for ransomware to infect you.
  • Use two-factor authentication. This is a big ask, but it is the best way to stay safe online. Two-factor authentication is where you enter your password on a website, please use something other than “password” and THEN enter a special code that is texted to your phone, or that you get from an app on your phone. This is the online shopping equivalent of having your own personal security guard. 
  • Use one credit card for online shopping, not multiple credit cards. This centralizes your risk in one place and makes you pay close attention to how much you are spending and where. 
  • Pay attention to your bank account. If money is leaving without your knowledge, call the bank or credit card company ASAP.  

You might also like...

Check out some other posts from Tulane University

1 min

Expert: Historic password breach creates public urgency for better password protection

Cybercriminals recently executed a significant breach, stealing the world’s most extensive collection of passwords. These stolen credentials, a staggering 10 billion unique passwords, have been uploaded to the notorious RockYou2024 database, a hub for cybercriminal activity. Tulane University cybersecurity expert Demetrice Rogers says the stolen passwords are a significant vulnerability for most users and underscore the need for strong password management. With malicious actors now armed with an extensive database of nearly 10 billion unique passwords, the risk of successful hacks on unsuspecting users is significantly higher. "The massive growth of the RockYou2024 password list shows just how tough it’s getting to keep our accounts safe. Hackers will love this list, making it a go-to tool for breaking into accounts. We need strong, unique passwords and multi-factor authentication to stay one step ahead. Think of it like locking your doors and setting the alarm—essential steps to keep the cybercriminals out." Rogers can cover: • How users can check to see if their information and passwords are included in the leak. • The importance of creating strong, unique passwords for each account and using reputable password managers to generate and store them securely. (Many users use the same password across multiple websites, making an attacker’s job much easier.) • Why adopting multi-factor authentication is increasingly important to ensure account security.

2 min

Are soaring home insurance rates in Gulf Coast states coming for the rest of the country?

The Gulf Coast faces an expected active 'above-normal' hurricane season, with many insurance carriers withdrawing from the market. Homeowners are left with skyrocketing rates and dwindling coverage options. Louisiana bore the brunt with four major hurricanes in 2020 and 2021, causing $75 billion in combined damage. The state passed a series of insurance reforms to attract more insurance companies, following in the footsteps of Florida. Insurance woes for homeowners aren’t just a coastal issue. Homeowners in the Midwest are struggling with insurance carriers because of damage from the record amount of tornadoes. Wildfires in the US are also a growing threat to insurance carriers, accounting for an annual total cost between $394 billion and $893 billion. Christopher Otten, an insurance and legal expert at Tulane University’s A. B. Freeman School of Business, is available to speak about the impact of new hurricane insurance regulations in several states, the challenges of holding insurance carriers accountable from state to state and the difficulties property owners face in finding hurricane insurance. Christopher can also discuss: • Why insurance markets differ among the states in the Gulf Coast region. • The Fortified Roof incentive programs • Affordability and the need for more carriers to improve competition and pricing risk. Christopher Otten Quote: “The Gulf States are the canaries in the coal mine right now for insurance markets,” Otten said. “It’s probably going to get worse before it gets better. A quiet hurricane season, as unlikely as that is, will help things some – but that doesn’t mean rates will not go up or down. They may increase less than they otherwise would have. With these new laws, particularly in Louisiana, it will take a hurricane for us to know how the new regulations are shaping out.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

2 min

Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks

Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and consumers. Tulane University cybersecurity expert Demetrice Rogers is available to discuss the next steps in auto industry recovery efforts and what other industries can learn from the incident to avoid repeat attacks. Professor Rogers can speak about: 1. The implications for data security and privacy and the possible compromise of sensitive customer data, including personal information and financial details. 2. Specific cybersecurity weaknesses within the automotive industry that made these car dealerships targets for the cyberattack. 3. Offer insights into effective cybersecurity measures and best practices that car dealerships can implement to strengthen their defenses against future cyber threats. Quote from Demetrice Rogers: “The preliminary reports indicate that the attack on CDK Global was a ransomware incident. Their systems will essentially be held hostage until specific demands, likely monetary, are fulfilled. Initial reports indicate CDK plans to pay the ransom, which could be tens of millions of dollars, to the attackers. I would expect systems to slowly come back online, with some data and processes unavailable until they have fully recovered.” “This situation highlights the critical need for an effective backup and disaster recovery program. Organizations should routinely test their recovery capabilities to ensure preparedness for such incidents. Additionally, it is generally recommended not to comply with hackers' demands or pay the ransom. While it is true that some companies opt to pay (though this is rarely publicized), it is usually more prudent to activate a well-prepared disaster recovery plan.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

View all posts