Have you updated your Facebook profile recently? Maybe you’ve forgotten about that picture of you drunk at the Las Vegas pool party. Well, the bad guys haven’t, and they are using that information for identity theft.
A phishing scam going around tries to convince users that their information is needed to help update Facebook. Unfortunately, thousands of people have put their info into a fraudulent website. That’s when identity theft occurs.
It starts with a simple email asking you to confirm or change your data on Gmail, Facebook, Dropbox, and other websites. The links lead to malicious sites asking for user names and passwords (bank account numbers and other details).
Protect your identity and personal information by taking these measures to ensure that prying eyes won’t find them.
Embrace Two-Factor Authentication
Two-factor authentication is one of the best ways to protect your accounts from hackers who may try to access them through phishing emails or other means. When you log into an account, the website usually sends a code only you can access — usually via text message or an app on your phone — to prove your identity.
If someone knows your username and password but doesn’t have this authentication code, they can’t log into your account without it. This makes it much harder for someone who has stolen your login credentials to get into your accounts without being noticed by you or by other people who might also notice suspicious activity on their accounts.
Use Strong Passwords
So many people, especially those visiting sites such as betting sites not on Gamstop use weak passwords that hackers can easily guess. That means that if someone gets into your computer or mobile device and has access to your social media accounts, they can probably get into other accounts where you use the same password.
Ensure that all your passwords are strong, including letters, numbers, and symbols — at least eight characters long, with no words (no “password”). If a password is too short or easy to guess, it won’t help protect against phishing scams!
Create Phishing Awareness In Your Company Culture
Creating a phishing awareness program in your company culture is the best way to protect your employees from falling victim to phishing scams.
To create a successful phishing awareness program, follow these tips:
- Ensure everyone knows the signs of a phishing scam. Your employees must understand how to identify an email that’s trying to trick them into clicking on a link or giving up their personal information. If you have employees who work remotely, ensure they know how to protect themselves from phishing scams.
- Ensure your employees know where they can report suspicious emails or websites they’ve seen while working online. Create an email address or phone number specifically for this purpose so that it’s easy for your employees to report any suspicious activity they see at work or in their personal lives.
- Train new hires on what makes an email look suspicious and what to do if they receive one — even if it comes from someone inside the company! New hires are often targeted because they don’t know what makes an email appear legitimate or malicious. So, ensure you cover this during orientation and keep training sessions updated as new trends emerge.
Don’t Share Too Much Personal Information On Social Media
Sharing personal information on social media is one of those things that are best done in moderation. While it can be tempting to share every little detail about your life, it’s important to remember that there’s no such thing as privacy on the internet.
To keep your information safe from scammers and other malicious actors, you must protect yourself and your friends by knowing what not to share online. You should never share these things on social media:
1. Your full name
2. Your home address or phone number
3. A picture of your house or car, license plate number
4. Photos of your pets or children (without permission)
5. Any passwords, PINs, or access codes for any accounts (including bank accounts and credit cards)
If you must share sensitive information on social media (such as your credit card number). Ensure it’s not visible to anyone who doesn’t need access to it — including the person who posted the information in the first place!
Turn Off Your Location Settings
Your location is a valuable piece of information for scammers. If you’re not careful where you post, it can be used against you in phishing scams.
The most common way scammers use your location data is to trick you into thinking they’re local. They’ll do this by using a fake website that looks like your bank’s or some other familiar institution, so you believe they are legitimate and enter your login details. But they don’t need those details if they know where you are and what bank account number to use.
To stop this, ensure your location settings are turned off on all social media sites, email accounts, and messaging apps. You may also want to consider turning off location services on your phone altogether — after all, there’s no reason for apps to know where you are all the time unless you want them to!
Pay Attention To Mobile Device Security
Ensure your operating system is up-to-date and any apps downloaded from an official app store like Google Play or the Apple App Store. If an app looks suspicious (such as one that asks for lots of permissions), don’t download it.
Also, ensure your device has strong password protection enabled, so no one else can get into it without your permission. If you lose your phone or tablet, change all your passwords immediately! And if you’re using a public Wi-Fi network (like at a coffee shop or airport), make sure you’re using a secure connection (look for “https” at the beginning of the website’s web address).
Keep Your Data Safe
Understanding your data privacy rights and how you can protect yourself from common scams will help you feel more confident about the information you share online. What’s more, you’ll have a better sense of the steps you can take to protect your data—and vital information for any individual going through an online recovery process.