I feel safe in assuming that if you met a stranger on the street who wanted you to disclose your personal banking information, you would tell him to go take a long walk off a short pier or keep you would keep your mouth shut at least. Then why do so many otherwise intelligent business owners fall for scams online?
When I speak to my clients about phishing scams and protecting their identity online, they nod their heads and assure me they would never fall for a Nigerian banking scam or open an attachment from an unknown person. Yet, every month, successful business owners contact me to ask for help reclaiming their lives after cyber criminals steal their identities.
The hard truth is recovering from identity theft is a long, painful process. It is much easier and way less expensive to prevent identity crimes from occurring in the first place by protecting yourself from an identity scam.
Help keep your identity more secure online by asking yourself these six questions to help prevent yourself from becoming another victim of identity scammers.
Unless you have an ongoing relationship with the sender of an email or message, any inquiry for personal information you receive is most likely an attempt to defraud you. Even if you have business with the company supposedly contacting you, is there a legitimate reason for the business to communicate with you now?
It is now common for a fraudster to choose the name of a large company like PayPal, Amazon or local utility company which most people use. So just because you are a customer of a company, doesn’t mean the email is real. If you are ever in doubt about whether a request from a company is legitimate or not, open a new web browser and visit the company’s website by typing the full domain name directly into the address bar. Never click on any links from the email which may take you to a copy of the company’s site.
Carefully examine any email you receive which asks for sensitive information. Compare the questionable email to other emails which you have received in the past from the same company and know are legitimate. Look at details like the logo, the salutation, and the way the email is written. The majority of phishing scams originate outside the United States in countries where English is not the official language. Many scam emails contain multiple spelling and grammar mistakes.
When an email contains language which encourages a quick response to prevent being locked out of your account or losing your benefits it is most often a red flag.
Online scammers are great at making their emails and social messages appear to be coming from a friend or associate you know. Manipulating the source of a message, or the header is ‘spoofing.’ Spoofing causes US businesses to lose billions of dollars in fraud.
Before you respond to an unexpected message requesting by sending any form of personal information, always double check that the sender’s email matches the person or company you think sent the message. If the sender is using an email address which is different, don’t respond. The safest approach is calling and speaking with the sender by telephone to verify the legitimacy of the request.
Many scammers use a spoof email to ask users to confirm personal information relating to the individual’s account. Most of the time, the information these scammers ask for is something which a real business would not need to confirm a user’s identity.
Banks and financial institutions never request users to confirm passwords or user names through email. A legitimate business won’t ask for you to send sensitive information over an unsecured server.
The majority of purchases in the US are made online. But before you input your credit card information, you need to make sure you are not about to send your credit card information to a scammer. Help keep your bank account safe by always checking that the payment page is secure and authentic.
Never access a payment page directly from an off-site link. It is common for a cyber criminal to send a spoof email which contains an embedded link to a special offer. But when you click on the link, it redirects you to a copy of the site designed by the scammer to steal your credit card information. Never pay on a page which doesn’t have a “https://” before the domain name and look for an icon of a padlock in the address bar. If you are unsure about the security of a site’s payment page, don’t make a purchase.
A profile on a social media service like Facebook, Instagram, LinkedIn, and Twitter is a treasure trove for identity thieves. Many users of these social media services do not understand just how much of the information they publicly share can help scammers to gain access to their accounts. Avoid sharing sensitive information such as birth dates, anniversary dates, names of children, pets, friends, and spouses. Don’t post pictures scammers can use to create fake accounts. Never reveal your home or work address.
Always use the highest level of privacy available from a social media service and never accept strangers as friends.
Regrettably, it is impossible to guarantee you will never be a victim of online identity theft, but when you remember to ask yourself these questions, you will lower the chances you will.
It takes an average of 287 days for security teams to identify and contain a data breach, according to the “Cost of a Data Breach 2021” report released by IBM and Ponemon Institute.
The average cost of a data breach in the United States is $8.64 million, which is the highest in the world, while the most expensive sector for data breach costs is the healthcare industry, with an average of $7.13 million (IBM).
The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures “2022 Cybersecurity Almanac.”.
The three sectors with the biggest spending on cybersecurity are banking, manufacturing, and the central/federal government, accounting for 30% of overall spending (IDC).
More than 33 billion records will be stolen by cybercriminals by 2023, an increase of 175% from 2018.
40% of businesses will incorporate the anywhere operations model to accommodate the physical and digital experiences of both customers and employees (Techvera).
Forty-three percent of attacks are aimed at SMBs, but only 14% are prepared to defend themselves (Accenture).
The internal team was energized. With the Level 1 work off its plate, the team turned its attention to the work that fueled company growth and gave them job satisfaction.
We did a proof of concept that met every requirement that our customer might have. In fact, we saw a substantial improvement.
We did everything that we needed to do, financially speaking. We got our invoices out to customers, we deposited checks, all the things we needed to do to keep our business running, and our customers had no idea about the tragedy. It didn’t impact them at all.
“We believe our success is due to the strength of our team, the breadth of our services, our flexibility in responding to clients, and our focus on strategic support.”