Security & Fraud

Different Types of Fraud

PHISHING

Phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.

SMISHING

Smishing is the practice of sending text messages to someone in order to trick the person into revealing personal or confidential information which can then be used for criminal purposes.

VISHING

Vishing is the practice of using the telephone to trick victims into providing sensitive information, such as financial details or credit card information.

SKIMMING

Skimming is when a device is illegally installed on or inside a card reader to capture card data and record information from the magnetic strip, like the cardholders’ PIN number.

Steps You Can Take to Protect Yourself Online

  1. Use Strong, Unique Passwords: Create strong passwords for your accounts, and avoid using the same password across multiple sites. Consider using a reputable password manager to generate and store complex passwords securely.
  2. Enable Two-Factor Authentication (2FA): Also known as Multi-Factor Authentication (MFA). Whenever possible, enable 2FA for your online accounts. This adds an extra layer of security by requiring a second form of verification (like a code sent to your phone) in addition to your password.
  3. Keep Software Updated: Ensure that your operating system, antivirus software, web browsers, and other applications are always up to date with the latest security patches and updates.
  4. Be Cautious with Personal Information: Avoid sharing sensitive information such as your full birthdate, Social Security number, or financial details unless absolutely necessary and through secure channels.
  5. Use Secure Connections: When browsing the web, make sure the websites you visit use HTTPS (look for the padlock icon in the address bar). Avoid using public Wi-Fi for sensitive activities without using a virtual private network (VPN) for added security.
  6. Be Wary of Phishing Attempts: Be cautious of unsolicited emails, messages, or phone calls asking for personal information or urging you to click on links or download attachments. Verify the sender’s identity before taking any action.
  7. Review Privacy Settings: Regularly review and adjust the privacy settings on your social media accounts and other online services to control who can see your information.
  8. Backup Important Data: Regularly back up important files and data to an external hard drive or secure cloud storage service. This can protect your data in case of hardware failure, ransomware, or other issues.
  9. Educate Yourself and Others: Stay informed about current online threats and best practices for online security. Educate family members, especially children, about safe internet usage.
  10. Use Security Software: Install reputable antivirus and anti-malware software on your devices to help detect and protect against malicious software and threats.

By following these steps, you can significantly enhance your online security and reduce the risk of falling victim to cyber threats.

Fraud Text Examples

LEGITIMATE TEXT

FRAUDULENT TEXT

Call to Action

If you believe that your information may have been compromised or if you have been the victim of a scam, please use the resources listed below: