When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.
|
|
- Gary Garrison
- 8 years ago
- Views:
Transcription
1 Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them. However, like all online activity, job hunting carries certain risks which you need to be aware of and take precautions against, in order to stay safe. The Risks Fictitious job posts leading to fraud or identity theft. Phishing s enticing you to visit fraudulent websites. Unwitting participation in criminal activity. Divulging personal or financial information in online application forms and profiles. Divulging personal or financial information on your CV. Criminals hacking into your account. Unwittingly notifying your current employer that you are looking for a new job. Fraudulent work at home schemes where you not reimbursed for work done, or liable for expenses incurred such as postage and phone calls. Being tricked into paying money up front in exchange for the possibility of employment. Being tricked into paying money up front for non-existent CRB (Criminal Records Bureau or DBS- Disclosure and Barring Service) checks or CV preparation services. Your personal safety being compromised by bogus potential employers. Exposure to viruses and spyware. Safe Jobsite Registration When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 1
2 Most jobsites offer flexibility regarding whether you keep your profile public, confidential or private (non-searchable). Reputable sites will explain the difference, and you should choose the option most suitable for you. Never divulge private information such as your National Insurance number, driver's licence number, bank account information, credit card information, passport number or date of birth. Select and use a safe password and never reveal it to anybody. Safe CVs Never divulge private information such as your National Insurance number, driver's licence number, bank account information, credit card information, passport number or date of birth. Avoiding Money Laundering Some money laundering activities are perpetrated via criminals using other people s personal bank accounts to move stolen money. Never divulge personal bank account details until you have been successful in your application, and are satisfied that your employer is legitimate. Avoiding Scams If you receive an claiming to be from a potential employer who has seen your CV on a job site, take care when clicking on links and ensure they go to a legitimate job posting. Work at Home Schemes Work at home schemes are a favourite vehicle for fraudsters. Be particularly wary of envelope-stuffing, assembly work and medical billing or claims processing work. Legitimate work-at-home employers should be willing and able to answer a variety of questions about their programmes. Here are some questions to ask: What tasks your will have to perform (ask the potential employer to list every step of the job). Whether you will be paid a salary, or your pay be based on commission. Who you will be paid by. When you will receive your first payment. Other Information Ensure that a potential employer is genuine before meeting for an interview, to ensure that your personal safety is not threatened. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 2
3 Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online. Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. It is surprisingly easy to inadvertently give away your personal information online, especially when prompted to do so by an , on social networking sites or on company websites requesting information which they do not necessarily need to do business with you. In addition, certain organisations hold information about you which enables you to carry out transactions with them. These include government departments such as HMRC, financial institutions such as banks, building societies and insurance companies, retailers, search engines... the list is virtually endless. They are all subject to the Data Protection Act, but you still need to be vigilant about their use of your data. The Risks Identity theft Blackmail/extortion Defamation of character Unsolicited selling and marketing People using awareness of your activities and movements to act against you Employers using the information to exploit you How Your Privacy can be compromised Unencrypted and most website interactions can be monitored, including by your employer and your ISP. Via phishing - where an illicit prompts you to click on a link to a bogus website which will collect your private or financial information. Via vishing (short for 'voice phishing'), where fraudsters call you either on the phone or in person, to collect your private or financial information. Using unsecured WiFi networks both in the home/office and when out and about. Using unencrypted links for sensitive communications (for example not using a VPN to connect to the office). 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 3
4 Not using secure websites when banking or making online payments, including those for purchases. Not using strong passwords, not regularly changing passwords, not using passwords at all or revealing passwords to other people. Not using a secure or webmail account. Using a work account for personal . Staying logged in to a website or account when the computer/smartphone/tablet is going to be used by somebody else. Via spyware and viruses, including those that log your keystrokes to determine your online activity. Via physical keystroke loggers attached to the keyboard cable. Not storing personal or financial documents securely. Not shredding unwanted personal or financial documents. Being taken into people s confidence too easily. Maintaining Your Privacy Ensure you always have effective and updated antivirus/antispyware software running. In a public or work environment, check your computer physically for any unusual devices that may be plugged in, especially on the keyboard cable. Use secure websites when shopping or banking online. Log out of secure websites when you have finished your transaction, as closing the window may not automatically log you out of the site. Use strong passwords, change your passwords regularly and never reveal them to other people. Avoid using a work address for personal use. Instead, have a separate, private address for private business. Make sure your home/office WiFi network is secured. Store personal and financial documents securely. Shred unwanted personal or financial documents. Be careful to whom you disclose personal information. Where possible, avoid using your real name online. Be cautious about who is trying to befriend you online including via and social networks/dating sites. Be wary of disclosing personal information on a work or personal web site. Use a disposable, anonymous webmail account for websites that demand an address to register. Set clear guidelines for children about when and how they can reveal information. Additional Information You are legally entitled to request a copy of all the personal data that an organisation holds on you, known as a subject access request. The organisation is obliged to deliver the data within 40 calendar days, and may charge a fee of up to 10 to do so. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 4
5 What to do if you have been a victim of online crime If you think you have been a victim of cyber-enabled economic fraud (i.e. where you have lost money) you should report it to Action Fraud, the UK s national fraud reporting centre by calling or by visiting If you are a victim of online abuse or harassment, you should report it to your local police force. Keep your money safe Never hand over money or give your bank details to a recruiter or employer to try and secure employment. A professional recruitment company or employer will not ask Job Seekers for money to process applications or to guarantee work Make sure the employer is genuine Professional companies will use company addresses and traceable contact numbers Check that the telephone number matches the location of the company's address Be cautious of job advertisements that have a foreign contact number. If you are uncertain whether an employer is genuine, then give them a call, ask for references or use an online search engine to see if anything of concern comes up Keep your identity safe Unless you are sure the company is reputable and the job advertisment is genuine, be protective of your National Insurance number, passport number and bank details. This is all someone needs to pretend to be you and make purchases or open accounts in your name If you are uploading your CV onto an online job board avoid including valuable identification details and definitely not financial details 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 5
6 If when applying for a job online you are asked to send a form of identification for them to scan to check your identity This is not a legitimate request Be alert to fictitious job offers If you have received an advertising a job you have not applied for Look out for job offers that claim they can make you rich quickly and offer incredibly high salaries for part-time hours, but require you to make an upfront payment to secure work or accommodation. A professional recruitment company or employer will not ask you for money to work for them Fraudulent individuals will often steal the reputation of a company and pretend to be advertising job opportunities in their name If you are in any doubt then call the contact number and make any checks necessary to confirm the authenticity of the company Examples of scams include: s offering financial, physical or emotional benefits, which are in reality linked to a wide variety of frauds. These include s posing as being from trusted sources such as your bank, the Inland Revenue or anywhere else that you have an online account. They ask you to click on a link and then disclose personal information. Phishing s Phishing is a scam where criminals typically send s to thousands of people. These s pretend to come from banks, credit card companies, online shops and auction sites as well as other trusted organisations. They usually try to trick you into going to the site, for example to update your password to avoid your account being suspended. The embedded link in the itself goes to a website that looks exactly like the real thing but is actually a fake designed to trick victims into entering personal information. The itself can also look as if it comes from a genuine source. Fake s often (but not always) display some of the following characteristics: The sender s address is different from the trusted organisation s website address. The is sent from a completely different address or a free webmail address. The does not use your proper name, but uses a non-specific greeting such as Dear customer. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 6
7 A sense of urgency; for example the threat that unless you act immediately your account may be closed. A prominent website link. These can be forged or seem very similar to the proper address, but even a single character s difference means a different website. A request for personal information such as username, password or bank details. You weren't expecting to get an from the organisation that appears to have sent it. The entire text of the is contained within an image rather than the usual text format. The image contains an embedded link to a bogus site Use safely Do not open s which you suspect as being spam. Do not forward s which you suspect as being spam. Do not open attachments from unknown sources. Do not readily click on links in s from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the . Do not respond to s from unknown sources. Do not make purchases or charity donations in response to spam . Don t click on remove or reply to unwanted . Check junk mail folders regularly in case a legitimate gets through by mistake. When sending s to multiple recipients, list their addresses in the 'BCC' (blind copy) box instead of in the 'To' box. In this way, no recipient will see the names of the others, and if their addresses fall into the wrong hands there will be less chance of you or anybody else receiving phishing or spam s. Similarly, delete all addresses of previous parties in the string, before forwarding or replying. If you are suspicious of an , you can check if it is on a list of known spam and scam s that some internet security vendors such as McAfee and Symantec feature on their websites. Most Microsoft and other clients come with spam filtering as standard. Ensure yours is switched on. 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 7
8 Most spam and junk filters can be set to allow to be received from trusted sources, and blocked from untrusted sources. When choosing a webmail account such as gmail, Hotmail and Yahoo! Mail, make sure you select one that includes spam filtering and that it remains switched on. Most internet security packages include spam blocking. Ensure that yours is up to date and has this feature switched on. Online Booklet A Rough Guide to Online Safety hguide.pdf Report online fraud cases concerning UK employer details to: Ensure you always have effective and updated antivirus/antispyware software running. Always beware of people looking over your shoulder when you are entering private information on a computer, smartphone/tablet or ATM What to do if your Identity has been stolen Act promptly in order to minimise the impact of the theft Contact any affected websites and advise them about the problem If you can, log in and change your password immediately using a strong password 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 8
9 If you are unable to log in, contact the website s technical support department immediately for further advice Contact: 5/02/2015 EURES UK Labour Market and Recruitment Process Webinar Page 9
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationHelping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
More informationAdvice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
More informationGuide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
More informationFraud. Your guide to protecting yourself from fraud
Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect
More informationOIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
More informationOnline Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationHow to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
More informationTo p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g
To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use
More informationFraud Guide Fraud Protection
Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different
More informationOffice of the Privacy Commissioner of Canada. Identity Theft and You
Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
More informationRemote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationProtecting your business from some of the current fraud threats
Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has
More informationIDENTITY THEFT and YOU
IDENTITY THEFT and YOU IDENTITY THEFT The Criminal Code was amended in 2010 to make identity fraud and identity theft criminal offences. With today s proliferation of technology, stealing innocent people
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationFighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
More informationProtection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
More informationFraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
More informationFraud Prevention Guide
Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls
More informationFraud Trends. HSBCnet Online Security Controls PUBLIC
Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message
More informationSTRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
More informationEmail Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
More informationSENIORS ONLINE SECURITY
SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that
More informationRecognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
More informationMarket Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
More informationsuntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More informationUseful Click & Tell tips to pass on. GET SAFE ONLINE.org WEEK
Useful Click & Tell tips to pass on GET SAFE ONLINE.org WEEK 1 If your computer failed, was stolen, or destroyed in a flood or fire, would you lose your precious photos, favourite music tracks and valuable
More informationSTUDENT S INFORMATION SECURITY GUIDE
STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and
More informationAnother Legal Guide from Bonallack & Bishop Solicitors
Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing
More informationSTOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationHow to protect your identity. Identity fraud explained
How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,
More informationA Guide to Email. For Beginners
A Guide to Email For Beginners What is email? Email is a way of sending messages or letters to someone electronically using the internet. Messages usually arrive instantly in the recipient s mailbox. In
More informationI dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
More informationSending money abroad. Plain text guide
Sending money abroad Plain text guide Contents Introduction 2 Ways to make international payments 3 Commonly asked questions 5 What is the cost to me of sending money abroad? 5 What is the cost to the
More informationTips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
More informationIdentity fraud explained. How to protect your identity
Identity fraud explained How to protect your identity Contents Raising the alarm 3 What is identity fraud? 4 When your identity is in danger 4 Keeping your identity safe 6 Spotting the warning signs 6
More informationCorporate Account Takeover & Information Security Awareness
Corporate Account Takeover & Information Security Awareness 1 The information contained in this presentation may contain privileged and confidential information. This presentation is for information purposes
More informationInternet security. Work & learning. Staying safe online. AgeUKIL4
Internet security Staying safe online Work & learning AgeUKIL4 Information and advice you need to help you love later life. We re Age UK and our goal is to enable older people across the UK to love later
More informationProtecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
More informationData protection. Protecting your personal information online
Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability
More informationIDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
More informationOnline Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationNEVER guess an e-mail address. Your mail will nearly always go to the wrong person.
16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal
More informationSTOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION
STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
More informationIdentity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationWhen visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationIdentity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
More informationIdentity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
More informationOUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION
OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION What is personal information? Personal information is information about you. It can be your name, address, or telephone number. It can also be the type
More informationHow To Get Help From The Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
More informationIntroduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
More informationComputer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
More informationIdentity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
More informationlocation of optional horizontal pic Corporate and Investment Banking Business Online Information Security
location of optional horizontal pic Corporate and Investment Banking Business Online Information Security Business Online Information Security Risk reduction: Ensuring your sensitive information is secure
More informationLearning to Detect Spam and Phishing Emails Page 1 of 6
Page 1 of 6 Email provides us a powerful communication tool. Unfortunately, it also provides scammers an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch
More informationCustomer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationRC284. Protect Yourself Against Identity Theft
RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of
More informationProtecting your business against External Fraud
Monthly ebrief August 2012 Protecting your business against External Fraud Welcome to another edition of our monthly ebriefs, brought to you by Aquila Advisory, the boutique forensic accounting company.
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationA mule s life is a fool s life
A mule s life is a fool s life Allowing your bank account to be used to send and receive funds for others can result in a criminal record. A mule s life is a fool s life. The bank account lies at the heart
More information7 PRACTICES FOR SAFER COMPUTING
7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES
More informationSecurity Tips You are here: Home» Security Tips
Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam
More informationIdentity Theft: Informational Workshop
Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer
More informationCBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
More informationIt Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit
Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005
More informationInformation carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationCLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
More informationINFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
More informationFraud Information and Security
Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we
More informationWhat are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationCybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationMore Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More information