Safeguard Your Data

Protecting Your Company Information and Personal Safeguards

CDK will not request sensitive personal information such as SSNs, login credentials, or bank or credit card information via unsolicited phone, email, or internet-based communications.

CDK Client Security Tips
  • Click Smart. It only takes one click on a malicious link to cause irreparable damage. If you are unsure about a link, copy and paste the link into your browser rather than clicking on it.
  • Encrypt your confidential and/or sensitive information.
  • Provide access to CDK’s systems only to authorized employees.
  • Keep all of your work areas clear of confidential information.
  • Do not share your password and do not allow the sharing of passwords among employees.
  • Properly protect and dispose of CDK reports and electronic media provided to you.
Report Suspicious Events to CDK

If you receive a suspicious email, phone call or text message that looks like it is coming from CDK, let us know about it right away. Forward the original email you received as an attachment or a description of the phone call or text message to Someone from CDK will contact you or your employer as appropriate. CDK will take appropriate steps to address suspicious events.

Personal Safeguards

In addition to protecting your company’s data, there are steps you can take to help protect your personal data. Some additional tips for a safe online experience:

  • Change your password frequently or at least every 3 months.
  • Install and continually update your anti-virus program on your computer.
  • Be careful of pop-up messages that prompt you to update your computer when you are visiting a website.
  • Enable your privacy and security profile settings to restrict access to your personal information when you are using social media sites.
  • Close your browser window when you have completed your inquiries or postings.
  • Only you can keep yourself secure, so be vigilant.
Protect yourself against phishing and other computer fraud

Phishing and computer fraud comes in many varieties such as spoofed emails, voice messages and/or text messages. These messages often advise the recipient there is a problem with their bank account, credit card, or even a payroll issue that has to be addressed “right away.”

Some tips to help spot phony or fraudulent messages and actions you can take:
  • Be very suspicious of email that requests personal information such as user ID, password, PIN, email address, or Social Security number even if it appears to be coming from a legitimate source.
  • Be suspicious of emails that do not greet you by name but are addressed generically, such as “Dear Customer.”
  • Be suspicious of messages that seem urgent and require your immediate response. Even if it sounds legitimate, do not call the number given in the message or respond to the email. Verify that the message is legitimate by looking up the company information on the internet.
  • If an email seems suspicious, do not click on any of the links or open any attachments to the email. Your computer can become infected with malware once you click on a link.
Protect yourself against Identity Theft
  • Identity theft is a crime in which an imposter obtains key pieces of personal information, such as a Social Security or driver's license number to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials.
Some tips to help prevent Identity Theft
  • Only carry necessary personal information
  • Memorize your Social Security number or other government identification numbers
  • Never give out personal information to anyone unless you know who is requesting the information, and make sure it is for a valid reason
  • Check your credit reports regularly
  • Keep all of your checkbooks, personal documents and financial statements in a secure place
  • Shred all documents with personal information before disposing of them
  • Promptly report the theft of your wallet, credit cards, debit cards, checkbook or financial statements to law enforcement.
Protect yourself against Social Engineering

Social engineers are generally looking for access to your company’s data. Employees with access to critical systems and sensitive data are prime targets. Even without access to sensitive data or critical systems, an employee’s credentials can be used to gain access to other areas of networks that can allow the social engineer to target other employees. Social engineers most often are looking for financial data, intellectual property, personnel records, customer databases and personal or financial information that can be used to steal people’s identities.

Signs of a Social Engineering attack:
  • Refusal to give a call-back number
  • Pauses or unease when questioned
  • Overly complimentary
  • Claims that the request is urgent
  • Claim of authority
  • Name-dropping
Protect yourself against Fraudulent Check Scams

You should also be on the alert for fraudulent check scams. Some common types include:

  • Lottery schemes
  • Overseas Business Offers
  • Online Auction Overpayments
  • Apartment Rental/Roommates
  • Dating Websites/Romantic Chatrooms
  • Work-at-Home Ads
Tips to help protect you from these and other check scams:
  • Be cautious of any offer that sounds too good to be true.
  • Be cautious of any offer that requires you to purchase something, wire money, or provide account information in order to win the offered prize.
  • Do not use contact information obtained from a letter or email received to verify the legitimacy of the information provided. Verify all information using an independent verification process.