Frauds come in different ways. Keep yourself safe with the educational information and tips listed below.
Types of Fraud
There are many different types of frauds which share a common purpose: obtain personal information for fraudulent use.
Unsolicited email, with promotional content, that is usually sent in bulk to a large number of random accounts. It is also used in phishing scams and other online fraud.
A scam that involves the use of replicas of existing Web pages to try to deceive users into entering personal, financial or password data. Often suspects use urgency or scare tactics, such as threats to close accounts.
Also known as "malicious software", a malware is designed to harm, attack or take unauthorized control over a computer system. Malware includes viruses, worms, Trojan horses, some keyloggers, spyware, adware and bots. It’s important to know that Malware can include a combination of the types noted.
A computer virus is a malicious program that attaches itself to and infects other software applications and files without the user’s knowledge, disrupting computer operations.
Viruses can carry what is known as a “payload,” executable scripts designed to damage, delete or steal information from a computer.
A worm is similar to a virus but with an added, dangerous element.
Like a virus, a worm can make copies of itself; however, a worm does not need to attach itself to other programs and it does not require a person to send it along to other computers.
Protect your personal information and identity. The following tips can help you lower the risk of becoming a victim.
Safeguard your email
Email is often used as a vehicle to commit frauds, through the use of malware, phishing, and virus.
It is important that you analyze email behaviors and develop good habits to help protect your computer and your identity.
Never open or respond to Spam (unsolicited bulk email messages)
Delete all Spam without opening it. Responding to Spam will confirm your email address to spammers.
Do not open attachments with odd filename extensions
Files with double filename extensions are likely to be dangerous files and should never be opened. In addition,do not open email attachments that have file endings of .exe, .pif, or .vbs. These are extensions for executable files and could be dangerous.
Never click on links within an email. It’s safer to retype the Web address than to click on it from within the body of the email.
Never give out your email address or other sensitive or personal information to unknown web sites
If you don’t know the reputation of a Web site, don’t assume you can trust it. Many Websites sell email addresses or may be careless with your personal information.
Be wary of providing any information that can be used by others for fraudulent purposes.
Be aware of poor design, and/or bad grammar and spelling
Typos, grammar errors and unprofessional layout design may be signs of fraudulent emails. ¡Delete them immediately!
Do not choose “remember my Password”
Do not use the “remember my password” feature on financial services or banking websites. Avoid logging in on such sites from a public computer, since you cannot validate the computer’s integrity the fraud risk is higher.
Work on a computer you trust
There are many and different tools that help you protect your computer and data.
Having firewalls, antivirus, anti-spyware and other protection devices help keep a computer properly monitored and provide peace of mind when browsing on the web.
Select a strong password
The best password is an undetectable one. We recommend not to use important dates, relevant names, addresses or phone numbers.
Use a combination of letters, numbers and symbols.Try changing your passwords regularly.