cyber safety
2 SujetsCyber safety: do you know how to protect yourself from fraud?
You’re about to renovate your home. You’ve talked about the project with a contractor over several emails, and you’re anxious to get this thing off the ground. Soon enough, the contractor pops up in your inbox again, this time advising you that there’s been a cancelation and you can get started earlier than expected. As per your initial agreement, the service provider asks you to front a portion of the funds to procure supplies. You transfer the money as requested. Days go by and the contractor never shows. You contact the business and you’re totally flabbergasted by the response—the contractor’s email address had been hacked, it was a scam. This unfortunate event, which was widely covered in the media, is the true story of a woman living in Bristol, England. Every year, millions of people are scammed online in all kinds of ways, some of which are sophisticated enough to fool even the shrewdest among us. In many cases, banks and law enforcement find themselves unable to help victims get their money back. Beyond fiscal damages, there are health risks to consider as well, given that these crimes can trigger their fair share of anxiety and frustration. So it’s best to be careful when sending confidential information online, or when making any kind of financial transaction for that matter. Here are some quick tips that could end up saving you from a whole lot of fuss. Back to basics As a refresher, here are some basic rules to follow. Learn how to create secure passwords here. For your personal computer, it’s recommended that you install antivirus software and keep it updated. You can download antivirus software for free online. Don’t shy away from asking an expert to help you make the right decision for you. Also, make sure that you’re on a trusted site when you’re entering your personal information or making transfers online. Double-check the URL in the address bar to make sure that it’s legit. Ideally, you’d visit a trusted site by typing in the URL yourself or via your favourites, as opposed to clicking a link contained in your email or on a webpage. If you’re not sure whether a site or an email is the real deal, make a phone call to the person or organization you’re dealing with so you can have peace of mind. Remember—it’s relatively quick and easy for scammers to generate fake sites that are identical to their official versions. So stay on alert, and if you have any doubts, trust your gut and don’t go any further. Another item to check—make sure that the closed padlock icon (or the full key icon) is displayed next to the URL of the site you’re visiting so you know that the communication between the site and your browser is encrypted, and therefore secure (the URL will begin with https). Lastly, share your personal information (driver’s license number, birthday, and so on) only when absolutely necessary, especially over email and social media. Giving away this kind of info can make the work of scammers much easier later, when they use it for fraud or even identity theft. Regarding the latter, the consequences for the victim can be long and drawn out, including financial losses and a negatively effected credit report. Then there are all the corrective measures they’ll have to undertake with various institutions, and the stress associated with all that. Incidentally, the quizzes going around social media, which on the surface appear harmless, are an excellent means of collecting personal information if you’re a fraudster. Remember that financial institutions will never ask for your personal information via email. Lastly, it’s recommended that you be careful when using a public Wi-Fi connection. It’s easy for a hacker to create wireless access points to steal your personal information or infect your computer with a virus. Keep yourself cyber safe by only using trusted Wi-Fi connections that are password protected. When it’s too good to be true... One of the basic rules of the road when it comes to reducing your risk of being scammed is: when it seems too good to be true, get out! 419 scams are some of the most notorious scams on the web. Just take the Nigerian prince scam for example, where a prince offers to share a large inheritance with the victim in exchange for a few thousand dollars so he can flee the country. Don’t think anyone’s foolish enough to fall for it? Well they are. Every year, several variations on this scam cost web users around the world billions of dollars. There are even sites out there that catalogue some of the most infamous ones. When you’re offered a prize and you haven’t entered a contest, when someone wants to give you something for free or return an overpayment for an online purchase—watch out. If you think you’ve been the victim of fraud, please report the incident as soon as possible to the Canadian Anti-Fraud Centre (CAFC), even if that means swallowing your pride…7,1 kVues0like0CommentaireYour mobile content is precious—protect it.
According to the2017 CEFRIO survey, 62% of adults in Québec own a smartphone. These devices we use to communicate, navigate, take photos, make financial transactions and even gather data on our health also tend to carry a ton of other valuable information, not to mention documents. That said, not only is it totally normal to want toprotect your device from physical damage, it’s become a downright necessity with all the sensitive information the thing contains. If your phone falls into the hands of someone who’s less than honest, you could fall prey to fraud or even identity theft. Here are some tips to protect the data on that precious phone of yours—share it with your parents, friends and workmates. Don’t make it simple for scammers When your phone is unlocked, most of your apps, photos and other personal data also become more easily accessible . . . and more easily shareable! That’s why it’s so strongly suggested that you keep your device on auto-lock. Selecta solid passwordfor added security. We know that you know that 1-1-1-1 and 1-2-3-4 are not exactly unhackable password choices… The auto-lock setting may annoy several amongst you given how common it is to check our phones several times over the course of a day. The fingerprint scanner and facial recognition options are slightly less annoying, but remember that their effectiveness varies with the device and technology you’re using. It’s also best to limit your app downloads to known ones that are available on Apple’s App Store, Amazon’s Appstore or Google Play. Apps coming from other sites are not regularly verified and are therefore more likely to come with viruses. Before you install any app, take a few minutes to make sure that it’s regularly updated and beware of ones with very few comments on the download page. Update your apps, close them when they’re not in use and delete any you’re no longer using. Finally, don’t forget to download and install software updates on your phone—it makes it harder for hackers to gain access to your device. Also, remember that hackers like to useBluetoothto pirate phones and access your personal information. So make sure you always turn Bluetooth off to make your device undetectable, unless you need to use it, of course! Refrain from activating Bluetooth in busy public spaces, which are common scenes of cybercrime. In general, it’s always good to exercise caution when connected to a public network whose security settings you can’t control. You have the right to privacy Would you let a stranger follow you wherever you go? That’s what ends up happening, though, when you don’t take the time to configure the location services on your smartphone. Only authorize access to your location for apps that absolutely require it. The same goes for access to your camera, microphone and contacts. Limit the damage when you lose your phone By the late 2000s,surveyswere already indicating that the majority of respondents would rather lose track of their wallet than their mobile device. Does the same go for you today? Losing a phone comes with all kind of fuss. The consequences become more dire if your phone falls into the hands of a dishonest person. Besides auto-locking your phone, it’s also recommended that you activate the option that allows you to erase your device’s content remotely. On iPhone, for example, youcan erase your deviceon iCloud.com if you activatedFind My iPhoneprior to the event. In the event your phone is stolen, this precaution will at least prevent the thief from accessing your personal data. Getting rid of your phone? Last July, a young Ontario woman who thought her iPhone was garbage-worthy traded it in for a new one in-store in exchange for a rebate of a mere few dollars. Her phone was refurbished and resold to a man living in Dubai. The young woman was unpleasantly surprised when the new owner contacted her to compliment her on her personal photos. Remember this story when you’re thinking of repairing, exchanging or selling your phone—back up your personal data and then erase it completely. Regularlybacking up your contentusing your computer or the cloud is a good reflex to develop. What to do when you become a victim of cybercrime Unfamiliar service charges on your monthly invoice? Seeing messages or emails that you didn’t send on your phone? You might be the target of cybercriminals. If, despite taking all the necessary precautions, you do fall prey to cybercrime, act fast. In such a case, or if your device is lost or stolen, inform your service provider immediately and contact theCanadian Anti-Fraud Centreif need be.6,7 kVues0like1Commentaire