When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Size: px
Start display at page:

Download "When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number."

Transcription

1 Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them. However, like all online activity, job hunting carries certain risks which you need to be aware of and take precautions against, in order to stay safe. The Risks Fictitious job posts leading to fraud or identity theft. Phishing s enticing you to visit fraudulent websites. Unwitting participation in criminal activity. Divulging personal or financial information in online application forms and profiles. Divulging personal or financial information on your CV. Criminals hacking into your account. Unwittingly notifying your current employer that you are looking for a new job. Fraudulent work at home schemes where you not reimbursed for work done, or liable for expenses incurred such as postage and phone calls. Being tricked into paying money up front in exchange for the possibility of employment. Being tricked into paying money up front for non-existent CRB (Criminal Records Bureau or DBS- Disclosure and Barring Service) checks or CV preparation services. Your personal safety being compromised by bogus potential employers. Exposure to viruses and spyware. Safe Jobsite Registration When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 1

2 Most jobsites offer flexibility regarding whether you keep your profile public, confidential or private (non-searchable). Reputable sites will explain the difference, and you should choose the option most suitable for you. Never divulge private information such as your National Insurance number, driver's licence number, bank account information, credit card information, passport number or date of birth. Select and use a safe password and never reveal it to anybody. Safe CVs Never divulge private information such as your National Insurance number, driver's licence number, bank account information, credit card information, passport number or date of birth. Avoiding Money Laundering Some money laundering activities are perpetrated via criminals using other people s personal bank accounts to move stolen money. Never divulge personal bank account details until you have been successful in your application, and are satisfied that your employer is legitimate. Avoiding Scams If you receive an claiming to be from a potential employer who has seen your CV on a job site, take care when clicking on links and ensure they go to a legitimate job posting. Work at Home Schemes Work at home schemes are a favourite vehicle for fraudsters. Be particularly wary of envelope-stuffing, assembly work and medical billing or claims processing work. Legitimate work-at-home employers should be willing and able to answer a variety of questions about their programmes. Here are some questions to ask: What tasks your will have to perform (ask the potential employer to list every step of the job). Whether you will be paid a salary, or your pay be based on commission. Who you will be paid by. When you will receive your first payment. Other Information Ensure that a potential employer is genuine before meeting for an interview, to ensure that your personal safety is not threatened. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 2

3 Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online. Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. It is surprisingly easy to inadvertently give away your personal information online, especially when prompted to do so by an , on social networking sites or on company websites requesting information which they do not necessarily need to do business with you. In addition, certain organisations hold information about you which enables you to carry out transactions with them. These include government departments such as HMRC, financial institutions such as banks, building societies and insurance companies, retailers, search engines... the list is virtually endless. They are all subject to the Data Protection Act, but you still need to be vigilant about their use of your data. The Risks Identity theft Blackmail/extortion Defamation of character Unsolicited selling and marketing People using awareness of your activities and movements to act against you Employers using the information to exploit you How Your Privacy can be compromised Unencrypted and most website interactions can be monitored, including by your employer and your ISP. Via phishing - where an illicit prompts you to click on a link to a bogus website which will collect your private or financial information. Via vishing (short for 'voice phishing'), where fraudsters call you either on the phone or in person, to collect your private or financial information. Using unsecured WiFi networks both in the home/office and when out and about. Using unencrypted links for sensitive communications (for example not using a VPN to connect to the office). 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 3

4 Not using secure websites when banking or making online payments, including those for purchases. Not using strong passwords, not regularly changing passwords, not using passwords at all or revealing passwords to other people. Not using a secure or webmail account. Using a work account for personal . Staying logged in to a website or account when the computer/smartphone/tablet is going to be used by somebody else. Via spyware and viruses, including those that log your keystrokes to determine your online activity. Via physical keystroke loggers attached to the keyboard cable. Not storing personal or financial documents securely. Not shredding unwanted personal or financial documents. Being taken into people s confidence too easily. Maintaining Your Privacy Ensure you always have effective and updated antivirus/antispyware software running. In a public or work environment, check your computer physically for any unusual devices that may be plugged in, especially on the keyboard cable. Use secure websites when shopping or banking online. Log out of secure websites when you have finished your transaction, as closing the window may not automatically log you out of the site. Use strong passwords, change your passwords regularly and never reveal them to other people. Avoid using a work address for personal use. Instead, have a separate, private address for private business. Make sure your home/office WiFi network is secured. Store personal and financial documents securely. Shred unwanted personal or financial documents. Be careful to whom you disclose personal information. Where possible, avoid using your real name online. Be cautious about who is trying to befriend you online including via and social networks/dating sites. Be wary of disclosing personal information on a work or personal web site. Use a disposable, anonymous webmail account for websites that demand an address to register. Set clear guidelines for children about when and how they can reveal information. Additional Information You are legally entitled to request a copy of all the personal data that an organisation holds on you, known as a subject access request. The organisation is obliged to deliver the data within 40 calendar days, and may charge a fee of up to 10 to do so. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 4

5 What to do if you have been a victim of online crime If you think you have been a victim of cyber-enabled economic fraud (i.e. where you have lost money) you should report it to Action Fraud, the UK s national fraud reporting centre by calling or by visiting If you are a victim of online abuse or harassment, you should report it to your local police force. Keep your money safe Never hand over money or give your bank details to a recruiter or employer to try and secure employment. A professional recruitment company or employer will not ask Job Seekers for money to process applications or to guarantee work Make sure the employer is genuine Professional companies will use company addresses and traceable contact numbers Check that the telephone number matches the location of the company's address Be cautious of job advertisements that have a foreign contact number. If you are uncertain whether an employer is genuine, then give them a call, ask for references or use an online search engine to see if anything of concern comes up Keep your identity safe Unless you are sure the company is reputable and the job advertisment is genuine, be protective of your National Insurance number, passport number and bank details. This is all someone needs to pretend to be you and make purchases or open accounts in your name If you are uploading your CV onto an online job board avoid including valuable identification details and definitely not financial details 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 5

6 If when applying for a job online you are asked to send a form of identification for them to scan to check your identity This is not a legitimate request Be alert to fictitious job offers If you have received an advertising a job you have not applied for Look out for job offers that claim they can make you rich quickly and offer incredibly high salaries for part-time hours, but require you to make an upfront payment to secure work or accommodation. A professional recruitment company or employer will not ask you for money to work for them Fraudulent individuals will often steal the reputation of a company and pretend to be advertising job opportunities in their name If you are in any doubt then call the contact number and make any checks necessary to confirm the authenticity of the company Examples of scams include: s offering financial, physical or emotional benefits, which are in reality linked to a wide variety of frauds. These include s posing as being from trusted sources such as your bank, the Inland Revenue or anywhere else that you have an online account. They ask you to click on a link and then disclose personal information. Phishing s Phishing is a scam where criminals typically send s to thousands of people. These s pretend to come from banks, credit card companies, online shops and auction sites as well as other trusted organisations. They usually try to trick you into going to the site, for example to update your password to avoid your account being suspended. The embedded link in the itself goes to a website that looks exactly like the real thing but is actually a fake designed to trick victims into entering personal information. The itself can also look as if it comes from a genuine source. Fake s often (but not always) display some of the following characteristics: The sender s address is different from the trusted organisation s website address. The is sent from a completely different address or a free webmail address. The does not use your proper name, but uses a non-specific greeting such as Dear customer. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 6

7 A sense of urgency; for example the threat that unless you act immediately your account may be closed. A prominent website link. These can be forged or seem very similar to the proper address, but even a single character s difference means a different website. A request for personal information such as username, password or bank details. You weren't expecting to get an from the organisation that appears to have sent it. The entire text of the is contained within an image rather than the usual text format. The image contains an embedded link to a bogus site Use safely Do not open s which you suspect as being spam. Do not forward s which you suspect as being spam. Do not open attachments from unknown sources. Do not readily click on links in s from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the . Do not respond to s from unknown sources. Do not make purchases or charity donations in response to spam . Don t click on remove or reply to unwanted . Check junk mail folders regularly in case a legitimate gets through by mistake. When sending s to multiple recipients, list their addresses in the 'BCC' (blind copy) box instead of in the 'To' box. In this way, no recipient will see the names of the others, and if their addresses fall into the wrong hands there will be less chance of you or anybody else receiving phishing or spam s. Similarly, delete all addresses of previous parties in the string, before forwarding or replying. If you are suspicious of an , you can check if it is on a list of known spam and scam s that some internet security vendors such as McAfee and Symantec feature on their websites. Most Microsoft and other clients come with spam filtering as standard. Ensure yours is switched on. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 7

8 Most spam and junk filters can be set to allow to be received from trusted sources, and blocked from untrusted sources. When choosing a webmail account such as gmail, Hotmail and Yahoo! Mail, make sure you select one that includes spam filtering and that it remains switched on. Most internet security packages include spam blocking. Ensure that yours is up to date and has this feature switched on. Online Booklet A Rough Guide to Online Safety https://www.getsafeonline.org/themes/site_themes/getsafeonline/pdf/getsafeonline_roug hguide.pdf Report online fraud cases concerning UK employer details to: Ensure you always have effective and updated antivirus/antispyware software running. Always beware of people looking over your shoulder when you are entering private information on a computer, smartphone/tablet or ATM What to do if your Identity has been stolen Act promptly in order to minimise the impact of the theft Contact any affected websites and advise them about the problem If you can, log in and change your password immediately using a strong password 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 8

9 If you are unable to log in, contact the website s technical support department immediately for further advice Contact:www.actionfraud.police.uk 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 9

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Fraud. Your guide to protecting yourself from fraud

Fraud. Your guide to protecting yourself from fraud Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Fraud Guide Fraud Protection

Fraud Guide Fraud Protection Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different

More information

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

Fraud Prevention Guide

Fraud Prevention Guide Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls

More information

Useful Click & Tell tips to pass on. GET SAFE ONLINE.org WEEK

Useful Click & Tell tips to pass on. GET SAFE ONLINE.org WEEK Useful Click & Tell tips to pass on GET SAFE ONLINE.org WEEK 1 If your computer failed, was stolen, or destroyed in a flood or fire, would you lose your precious photos, favourite music tracks and valuable

More information

IDENTITY THEFT and YOU

IDENTITY THEFT and YOU IDENTITY THEFT and YOU IDENTITY THEFT The Criminal Code was amended in 2010 to make identity fraud and identity theft criminal offences. With today s proliferation of technology, stealing innocent people

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Fraud Trends. HSBCnet Online Security Controls PUBLIC

Fraud Trends. HSBCnet Online Security Controls PUBLIC Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Another Legal Guide from Bonallack & Bishop Solicitors

Another Legal Guide from Bonallack & Bishop Solicitors Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing

More information

Email Expanded Header: Viewing in Microsoft Outlook

Email Expanded Header: Viewing in Microsoft Outlook Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

A Guide to Email. For Beginners

A Guide to Email. For Beginners A Guide to Email For Beginners What is email? Email is a way of sending messages or letters to someone electronically using the internet. Messages usually arrive instantly in the recipient s mailbox. In

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

How to protect your identity. Identity fraud explained

How to protect your identity. Identity fraud explained How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

Internet security. Work & learning. Staying safe online. AgeUKIL4

Internet security. Work & learning. Staying safe online. AgeUKIL4 Internet security Staying safe online Work & learning AgeUKIL4 Information and advice you need to help you love later life. We re Age UK and our goal is to enable older people across the UK to love later

More information

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person. 16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal

More information

Sending money abroad. Plain text guide

Sending money abroad. Plain text guide Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the

More information

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

Identity Theft: Informational Workshop

Identity Theft: Informational Workshop Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Identity fraud explained. How to protect your identity

Identity fraud explained. How to protect your identity Identity fraud explained How to protect your identity Contents Raising the alarm 3 What is identity fraud? 4 When your identity is in danger 4 Keeping your identity safe 6 Spotting the warning signs 6

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION

OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION What is personal information? Personal information is information about you. It can be your name, address, or telephone number. It can also be the type

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

IDENTITY THEFT. Hawthorne Police Department

IDENTITY THEFT. Hawthorne Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Learning to Detect Spam and Phishing Emails Page 1 of 6

Learning to Detect Spam and Phishing Emails Page 1 of 6 Page 1 of 6 Email provides us a powerful communication tool. Unfortunately, it also provides scammers an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness 1 The information contained in this presentation may contain privileged and confidential information. This presentation is for information purposes

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

RC284. Protect Yourself Against Identity Theft

RC284. Protect Yourself Against Identity Theft RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of

More information

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited Security Guide for electronic transactions UniBank is a division of Teachers Mutual Bank Limited Teachers Mutual Bank Limited ABN 30 087 650 459 AFSL/Australian Credit Licence 238981 Who We Are UniBank

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

NetBank security guide

NetBank security guide NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1 Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security location of optional horizontal pic Corporate and Investment Banking Business Online Information Security Business Online Information Security Risk reduction: Ensuring your sensitive information is secure

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

which you did not make,

which you did not make, What should you do if you think you ve been a victim of ID fraud? Put a fraud alert on your credit report. A fraud alert puts a red flag on your credit report and notifies lenders and creditors that they

More information

Protecting your business against External Fraud

Protecting your business against External Fraud Monthly ebrief August 2012 Protecting your business against External Fraud Welcome to another edition of our monthly ebriefs, brought to you by Aquila Advisory, the boutique forensic accounting company.

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Phoenix Information Technology Services. Julio Cardenas

Phoenix Information Technology Services. Julio Cardenas Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous

More information

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used

More information