Phishing Scam

  Phishing - the scammer tricks you into handing over your personal information.

  •      Hacking - the scammer gains access to your information by exploiting security weaknesses on your computer, mobile device or network.
  •       Remote scams - the scammer tricks you into giving access to your computer and paying for a service you don't need.
  •          Malware & ransomware - Malware tricks you into installing software that allows scammers to access your files and track what you are doing, while ransom ware demands payment to ‘unlock’ your computer or files.
  • Fake online profiles - the scammer sets up a fake profile on a social media or dating site and sends you a ‘friend’ request.
  • Document theft - the scammer gains access to your private information through unlocked mailboxes or discarded personal documents such as utility bills, insurance renewals or health care records.

 

Protect yourself

  • Do not open suspicious texts or emails – delete them.
  • Verify the identity of the contact by calling the relevant organization directly – find them through an independent source such as a phone book or online search. Do not use the contact details provided in the message sent to you.
  • Never send money or give credit card, online account details or copies of personal documents to anyone you don’t know or trust.
  • Choose passwords that would be difficult for others to guess, and update them regularly. Don't use the same password for every account, and don't share them with anyone.
  • Secure your networks and devices with anti-virus software and a good firewall. Avoid using public computers or WiFi hotspots to access or provide personal information.
  • Be very careful about how much personal information you share on social network sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam.
  • When making online payments, only pay for items using a secure payment service—look for a URL starting with ‘https’ and a closed padlock symbol, or a well known payment provider .
  • Put a lock on your mailbox and shred or destroy any documents containing personal information before disposing of them.

 NEXT on IDENTITY THIEF


//