Online Scammers

Scammers-3 Easy Steps To Protect Your Information

Protecting your personal information against scammers is a shared responsibility. You can shred all your mail and documents into little pieces of paper. Then you can buy the latest and most expensive computer security software. You can have the latest protection for your smartphone and mobile devices. You can have very-strong passwords on every single one of your accounts.

When phished and/or scammed, the above is useless.

Do your part against scammers by doing these 3 things:

  1. Make sure emails, texts, or phone calls are from the real source. Scammers pose as credible companies or organizations. They are “phishing” for your information. No legitimate business will ever call to ask for your login information. Check out our info-graphic in this post to learn how they do it. Even multi-factor authentication (MFA) has the potential of being exploited. You will see n example of this in the info-graphic. We will cover MFA in a future post.
  2. You should report suspicious texts, phone calls, and emails. Using phone, email, and text, scammers impersonate companies and organizations. They even imitate charities. They get consumers to click links and provide personal information. You need to report suspicious calls, emails, or texts to the actual company’s fraud and abuse hotlines. You can usually find the hotline numbers on official statements and websites.
  3. Don’t let scams ruin the holidays. Scammers expect you will fall for holiday scams. They know you want to have pleasant holidays. They count on this to lure you into making money cons and deals that seem too good to be true. The biggest of these is work-from-home scams. We will cover this type of scams in our next blog post.
The 5 Steps to Being Scammed

If you would like assistance implementing improved security practices for your business, contact us or leave a comment here on this post.

Would you like to start receiving articles like this and other related to ITSM, IT Policy, IT Consulting, and other IT service management related information today?  – START HERE!

Leave a Reply