Don’t be a Victim. Simple things to do to thwart Cybercrime
Cybercriminals are always finding new ways to trick you and hurt you. Follow our suggestions to be cognizant of the top risks you should be aware of and tips on how to avoid them.
What you can do to save from each of these 4 attacks:
Do not click links or open attachments in suspicious emails. Be especially wary of anything that’s not a normal office document (Excel, World, PDF, etc.), and anything compressed inside of a Zip file.
Don’t click on ads in your internet browser. And on computers and devices used for work, visit only work-related websites.
Never send passwords, personal or financial information via email. Legitimate companies will not ask you to verify sensitive information through email.
RansomWare is software that attempts to extort money from the owner of the computer, usually by doing something malicious such as encrypting important documents so that they’re unusable, and then demanding money to have them decrypted. RansomWare is often distributed through email links, attachments, or advertisements on the web.
Phishing attacks use fraudulent emails to trick you into clicking a link, opening an infected attachment, or revealing personal or financial information. These emails often appear to be from a legitimate company or someone you know.
CEO Fraud, aka ‘Whaling’
Similar to phishing, whaling uses fraudulent emails to gain access to sensitive information. In these cases, the emails appear to be sent from the company CEO or another top executive. Common requests include banking information, tax documents, or employee SSNs. Depending on their goal, the emails may be directed to someone in accounting, HR, or IT.
Social engineering typically begins with a phone call from someone pretending to be with a legitimate company – your internet service provider, or even Microsoft tech support. The scammers may claim your PC is infected and attempt to gain access to your computer by directing you to download a program. Or, they may try to convince you to purchase and install their ‘security’ software, which is actually a malicious program.
Avoid this scam:
Hang up immediately – no one from a legitimate company will call to assist with an issue you never reported.
Do not call technical support numbers listed on suspicious pop-up messages claiming your computer has been infected.