Blog / December 22, 2020 / by Kevin Solis

Protect Yourself from Scams and Suspicious Activities Online

Scams are a very serious problem since internet is more accessible. Scammers are getting more and more sophisticated in their labors to get your money or personal details. Be alert and protect yourself from being scammed by following our tips.

Scams target everyone

Scams target people of all types, ages and income levels across the world. However, people no technology friendly might be more vulnerable if they do not know how to spot scammers.

Scams thrive because they look like the real thing and catch you off guard when you’re not imagining it. Scammers are getting smarter and taking advantage of new technology, new products or services and major events to create credible stories that will persuade you to give them your money or personal details.

Protect yourself

    • Be aware to the fact that scams happen.

When dealing with uninvited contacts from people or businesses, whether it’s over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. Remember, if it looks too good to be true, it probably is.

    • Keep your personal details protected.

Put a lock on your mailbox and shred your bills and other important documents before throwing them out. Keep your passwords and pin numbers in a safe place. Be very careful about how much personal information you share on social media sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam.

    • Keep your mobile devices and computers locked.

Always use password protection, don’t share access with others (including remotely), update security software and back up content. Protect your WiFi network with a password and avoid using public computers or WiFi hotspots to access online banking or provide personal information.

    • Do not open suspicious texts, pop-up windows or click on links or attachments in emails.

If unsure, verify the identity of the contact through an independent source such as a phone book or online search. Don’t use the contact details provided in the message sent to you.

    • Know who you’re dealing with.

If you’ve only ever met someone online or are unsure of the legitimacy of a business, take some time to do a bit more research. Do a Google image search on photos or search the internet for others who may have had dealings with them. If a message or email comes from a friend and it seems unusual or out of character for them, contact your friend directly to check that it was really them that sent it.

    • Don’t respond to phone calls about your computer asking for remote access.

hang up – even if they mention a well-known company such as Telstra. Scammers will often ask you to turn on your computer to fix a problem or install a free upgrade, which is actually a virus which will give them your passwords and personal details.

    • Choose your passwords wisely.

Choose passwords that would be difficult for others to guess and update them regularly. A strong password should include a mix of upper- and lower-case letters, numbers and symbols. Don’t use the same password for every account/profile, and don’t share your passwords with anyone.

    • Review your privacy and security settings on social media.

 If you use social networking sites, such as Facebook, be careful who you connect with and learn how to use your privacy and security settings to ensure you stay safe.  If you recognize suspicious behavior, clicked on spam or have been scammed online, take steps to secure your account and be sure to report it.

    • Be careful of any requests for your details or money.

Never send money or give credit card details, online account details or copies of personal documents to anyone you don’t know or trust. Don’t agree to transfer money or goods for someone else: money laundering is a criminal offence.

    • Be cautious of unusual payment requests.

Scammers will often ask you to use an unusual payment method, including preloaded debit cards, gift cards, iTunes cards or virtual currency such as Bitcoin.

    • Be alert when shopping online.

Beware of offers that seem too good to be true, and always use an online shopping service that you know and trust. Think twice before using virtual currencies (like Bitcoin) – they do not have the same protections as other transaction methods, which means you can’t get your money back once you send it.

Signs for spotting a suspicious document

Documents are easily faked. Some will look just like the real thing but others might have warning signs, such as:

    • generic rather than personal greeting
    • names of organisations that don’t exist
    • poorer quality presentation
    • poorer quality grammar and spelling
    • overly official or forced language.

Documents such as flight itineraries and bank statements have simple, uncomplicated layouts even when they are legitimate because such businesses allow their customers to print online statements. This means that scammers can easily create fake documents by using information available online such as company logos and graphics from websites.

Signs for spotting a suspicious email

Scammers can easily fake an official-looking email, using the same logo and design as the real company.

Often your guard is down when you receive an email from a company you’ve dealt with before, such as Australia Post or an online shopping site you use. If you’re not expecting an email, always be alert to a fake before clicking on any links or opening any attachments.

Sings for spotting a fake dating profile

When looking at a new dating profile, note anything unusual about their choice of:

    • photo
    • location
    • interests
    • language skills matched to background.

Scammers often use fake photos they’ve found online.

Tip: Do an image search of your admirer to help determine if they really are who they say they are. You can use image search services such as Google.

 

 

Tags:
5 Comments
  • Acquich September 19, 2024

    BALF lipids and foamy macrophages could serve as biomarkers of pulmonary phospholipidosis priligy buy online usa Two tailed ANOVA, followed by ScheffГ© s F test, was used for multiple comparisons among groups and to compare data obtained in the same patients under different conditions

  • annuamn November 10, 2024

    How to use Pedipur pastillas priligy en mexico

  • annuamn November 19, 2024

    Invasively ventilated patients with COPD are at a high risk of prolonged mechanical ventilation 7 and at a high risk of persistent weaning failure do i need a doctor prescription to buy priligy

  • como comprar cytotec sin receta medica December 1, 2024

    2003; Bearzi et al can i purchase generic cytotec pill

  • medicament contre l'ejaculation precoce priligy May 10, 2025

    priligy reviews The two survival curves were significantly different according to the log rank test p 0

Leave a comment