- the scammer tricks you into handing over your personal information.
- the scammer gains access to your information by exploiting security
weaknesses on your computer, mobile device or network.
- the scammer tricks you into giving access to your computer and paying
for a service you don't need.
& ransomware - Malware tricks you into installing
software that allows scammers to access your files and track what you are
doing, while ransom ware demands payment to ‘unlock’ your computer or
Fake online profiles - the scammer sets up a fake
profile on a social media or dating site and sends you a ‘friend’ request.
Document theft - the scammer gains access
to your private information through unlocked mailboxes or discarded
personal documents such as utility bills, insurance renewals or health
Do not open suspicious texts or emails – delete
Verify the identity of the contact by calling the
relevant organization directly – find them through an independent source
such as a phone book or online search. Do not use the contact details
provided in the message sent to you.
Never send money or give credit card, online
account details or copies of personal documents to anyone you don’t
know or trust.
Choose passwords that would be difficult for others to
guess, and update them regularly. Don't use the same password for every
account, and don't share them with anyone.
Secure your networks and devices with
anti-virus software and a good firewall. Avoid using public
computers or WiFi hotspots to access or provide personal information.
Be very careful about how much personal information you
share on social network sites. Scammers can use your information and
pictures to create a fake identity or to target you with a scam.
When making online payments, only pay for items using a
secure payment service—look for a URL starting with ‘https’ and a closed
padlock symbol, or a well known payment provider .
Put a lock on your mailbox and shred or destroy any
documents containing personal information before disposing of them.