Broker Check

The Weekly Wealth Report

July 15, 2024

THE WEEK ON WALL STREET

Stocks advanced last week as market leadership shifted amid fresh inflation data and quarterly corporate reports starting to roll in.

The S&P’s 500 Index advanced 0.87 percent, while the Dow Jones Industrial Average picked up 1.59 percent. The tech-heavy Nasdaq Composite Index, which has led all year, rose 0.25 percent. The MSCI EAFE Index, which tracks developed overseas stock markets, rallied 1.62 percent for the week through Thursday’s close.

FACT OF THE WEEK

On July 15, 2006, the San Francisco-based podcasting company Odeo officially releases Twttr—later changed to Twitter—its short messaging service (SMS) for groups, to the public.

Born as a side project apart from Odeo’s main podcasting platform, the free application allowed users to share short status updates with groups of friends by sending one text message to a single number (“40404”). Over the next few years, as Twttr became Twitter, the simple “microblogging” service would explode in popularity, becoming one of the world’s leading social networking platforms.

Twitter co-founder Evan Williams first made his name in the Silicon Valley tech world by founding the Web diary-publishing service Blogger, which he sold to Google in 2003 for several million dollars. In 2005, William co-founded Odeo with another entrepreneur, Noah Glass; that fall, however, Odeo’s main service was made obsolete when Apple launched iTunes (including a built-in podcasting platform).

MARKET MINUTE

 Dow Breaks 40,000 (Again)

Mega-cap tech led modest gains for the S&P 500 and Nasdaq in the first two days of the week, with the Dow posting modest losses both days.

But that narrow trading range didn’t last long as market leadership shifted midweek. Upbeat corporate earnings reports and milder-than-expected consumer inflation in June drove momentum in a handful of larger industrial and consumer stocks.

Q2 earnings season got into full swing later in the week, dominated mostly by financial and consumer-oriented companies. Markets seemed initially unfazed by better-than-expected reports from some money center banks. Some observers suggested higher interest rates may be one of the reasons for the market’s lukewarm response.

The Dow ended the week with a solid gain after three consecutive weeks of trailing the S&P 500 and Nasdaq. The Dow also closed above 40,000, the first time it had done so since May, and hit a 52-week intraday high on Friday. 

Mixed Inflation News

Two inflation reports came out last week: PPI and CPI.

The Producer Price Index, which measures the change in wholesale prices, rose 2.6 percent in June year over year—its largest increase in 16 months. By contrast, the Consumer Price Index, which tracks consumer prices, showed that the pace of inflation slowed in June.

Markets shrugged off the conflicting data, instead embracing the cooler CPI data. The Fed is likely taking notes for its next Fed meeting, scheduled for July 30-31.

FINANCIAL STRATEGY OF THE WEEK

Data Breach: Your Security To-Do List

According to recent statistics, data breaches have become common in today's digital world. In fact, it is estimated that more than 111.7 million Americans have their personal information exposed to data breaches every year. Whether it's a major retailer, a subscription service, or another online platform, the risk of a data breach is a reality that we all face.

Names, email addresses, passwords, and other sensitive information are being swept up by hackers for fraudulent activities. These breaches come in two flavors: breaches of institutions that people trust with their data, such as retailers and banks, and breaches of entities that acquire user data secondarily, such as credit bureaus and marketing firms. However, individuals can take steps to protect themselves and minimize the impact of a breach.

If you receive a notification that your sensitive information has been stolen in a data breach, it's important to take immediate action to mitigate the damage. Data breaches can occur even if you practice good cybersecurity habits and are not personally targeted. Organizations and businesses can leak data due to human error, leaving your information vulnerable to bad actors.

To help you navigate this stressful situation, we have compiled a checklist of steps you should take if you have experienced a data breach.

  • Stay informed: Keep yourself updated about the breach by setting up news alerts or signing up for updates from the affected company. This will ensure that you are aware of any developments or actions being taken to address the breach.
  • Understand what data has been compromised: Read the notification carefully to understand what specific information may have been exposed. This could include your name, address, email, passwords, credit card details, or even your Social Security number. Knowing exactly what data has been compromised will help you take appropriate action.
  • Set up multi-factor authentication: Enable multi-factor authentication for all your online accounts. This adds an extra layer of security by requiring a second form of verification beyond your password, such as a unique code sent to your phone.
  • Change passwords: Change the passwords of all your online accounts, especially those that may have been compromised. Use strong, unique passwords for each account, and consider using a password manager to keep track of them.
  • Credit and financial accounts: Monitor your credit reports and financial accounts for any suspicious activity. You can request a free credit report annually from each of the three major credit bureaus (Equifax, Experian, and TransUnion.)
  • Watch out for phishing attacks: Be vigilant against phishing attempts, in which scammers try to trick you into revealing personal information or login credentials. Be skeptical of emails, messages, or phone calls asking for personal information or directing you to click suspicious links, and avoid clicking those links or providing sensitive information through email or phone calls. When in doubt, contact the organization directly through its official website or phone number to verify the request.
  • Report identity theft: If you suspect you are a victim of identity theft, report it immediately to the Federal Trade Commission (FTC) through its website IdentityTheft.gov. This resource will guide you through the necessary steps to recover from identity theft and protect yourself from further harm.
  • Use strong, unique passwords: Avoid using common or easily guessable passwords. Instead, use a combination of letters, numbers, and symbols. Additionally, use a different password for each online account to minimize the risk of multiple accounts being compromised if one password is breached.
  • Update your software: Keep your operating system, web browser, and antivirus software up to date to ensure you have the latest security patches and protections against known vulnerabilities.
  • Limit the information you share: Be cautious about sharing personal information online, especially on social media platforms. Avoid posting your full address, phone number, or other sensitive details that could be used for identity theft.
  • Use secure Wi-Fi networks: When accessing the internet in public places, use secure, password-protected Wi-Fi networks. Avoid using public Wi-Fi networks that are unsecured, as they can easily be intercepted by hackers.
  • Regularly back up your data: To be prepared for a breach or other data loss event, regularly back up your important files and data to an external hard drive or cloud storage service.

While these steps can minimize the risk of personal data breaches, it's important to remember that no security measure is foolproof. It's crucial to stay vigilant and be proactive in protecting your personal information. Experiencing a data breach can be a stressful and overwhelming situation. Following this checklist enables you to take the necessary steps to protect yourself and minimize the potential damage caused by the breach. Remember to stay informed, be proactive in securing your accounts, and report any suspicious activity to the appropriate authorities.