Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized your security and personal information settings on social networks?
These are all ways to own your online presence by controlling privacy and security settings.
In the past, online threats were primarily technical in nature, such as viruses or malware on your computer. But now, online threats are evolving and becoming more social, such as phishing ads based on your online searches, stolen passwords, identity theft and cyber bullying.
Small steps, such as monitoring your privacy settings and limiting what personal information you put online, can help you control your online identity.
Try to find a seller’s physical address (not just a P.O. Box) and phone number. With internet phone services and other web-based technologies, it’s tough to tell where someone is calling from. Do an internet search for the company name and website, and look for negative reviews. If you find them, you’ll have to decide if the offer is worth the risk. After all, it’s only a good deal if you actually get a product that works.
Con artists often insist that people wire money, especially overseas, because it’s nearly impossible to reverse the transaction or trace the money. Don’t wire money to strangers, to sellers who insist on wire transfers for payment, or to anyone who claims to be a relative or family friend in an emergency who wants to keep the request a secret.
Don’t leave it for as long as a month before you check each account.
Scammers steal account information and then run up charges or commit crimes in your name. If anything looks suspicious or you don’t recognize the transaction, contact your bank and/or card issuers.
In the aftermath of a disaster, give to established charities, rather than one that has sprung up overnight. Pop-up charities probably don’t have the infrastructure to get help to the affected areas or people, and they could be collecting the money to finance illegal activity. For more donating tips, check out www.ftc.gov/charityfraud.
If someone contacts you with low-risk, high-return investment opportunities, stay away. When you hear pitches that insist you act now, that guarantee big profits, that promise little or no financial risk, or that demand that you send cash immediately, report them at www.ftc.gov.
Not an online seller you’ve never heard of — nor an online love interest who asks for money. It’s best to do business with sites you know and trust. If you buy items through an online auction, consider using an option that provides protection, like a credit card.
Never pay fees now for the promise of a big pay-off later — whether it’s for a loan, a job, or a so-called prize.
No matter how convincing the story. By law, banks have to make funds from deposited checks available within days, but uncovering a fake check can take weeks. You’re responsible for the checks you deposit. If a check turns out to be a fake, you’re responsible for paying back the bank.
That goes whether the message comes as an email, a phone call, a text message, or an ad. Don’t click on links or call phone numbers included in the message either. It’s called phishing. The crooks behind these messages are trying to trick you into revealing sensitive information. If you got a message like this and you are concerned about your account status, call the number on your credit or debit card — or your statement — and check on it.
It’s illegal to play a foreign lottery, and yet messages that tout your chances of winning a foreign lottery, or messages that claim you’ve already won can be so tempting. Inevitably, you’re asked to pay “taxes,” “fees,”, or “customs duties” to collect your prize. If you send money to collect, you haven’t won anything. Indeed, you’ve lost whatever money you sent. You won’t get money back, either, regardless of the promises.
If you think you may have been scammed:
The bad guys constantly develop new ways to attack your computer, so your security software must be up-to-date to protect against the latest threats. Most security software can update automatically; set yours to do so. You can find free security software from well-known companies. Also, set your operating system and web browser to update automatically.
If you let your operating system, web browser, or security software get out-of-date, criminals could sneak their bad programs — malware — onto your computer and use it to secretly break into other computers, send spam, or spy on your online activities. There are steps you can take to detect and get rid of malware.
Don’t buy security software in response to unexpected pop-up messages or emails, especially messages that claim to have scanned your computer and found malware. Scammers send messages like these to try to get you to buy worthless software, or worse, to “break and enter” your computer.
Don’t hand it out to just anyone. Your social security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name. So every time you are asked for your personal information — whether in a web form, an email, a text, or a phone message — think about whether you can really trust the request. In an effort to steal your information, scammers will do everything they can to appear trustworthy.
When you’re online, a little research can save you a lot of money. If you see an ad or an offer that looks good to you, take a moment to check out the company behind it. Type the company or product name into your favorite search engine with terms like “review,” “complaint,” or “scam.” If you find bad reviews, you’ll have to decide if the offer is worth the risk. If you can’t find contact information for the company, take your business elsewhere.
Don’t assume that an ad you see on a reputable site is trustworthy. The fact that a site features an ad for another site doesn’t mean that it endorses the advertised site, or is even familiar with it.
If you’re shopping or banking online, stick to sites that use encryption to protect your information as it travels from your computer to their server. To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure).
Make it a habit to enter the address of any banking, shopping, auction or financial transaction website yourself and not depend on displayed links in emails or from other sites. If you see the “locked padlock” icon in the browser frame on the top near the address bar or on the bottom of the web browser, double-click it to display the security certificate for the site. If you get any warnings displayed that the address of the site you have displayed does NOT match the certificate, do not continue.
Follow alerts and warnings received by the browser. For example, if your browser reports that the site is a known phishing site, then do not continue to the site and type in your information.
Here are a few principles for creating strong passwords and keeping them safe:
No system is completely secure. Copy important files onto a removable disc/device or an external hard drive, and store it in a safe place. If your computer is compromised, you’ll still have access to your files.
Going wireless generally requires connecting an internet “access point” — like a cable or DSL modem — to a wireless router, which sends a signal through the air, sometimes as far as several hundred feet. Any computer within a range with a wireless card can pull the signal from the air and access the internet.
Unless you take precautions, anyone nearby with a wireless-ready computer or mobile device can use your network. That means your neighbors — or any hacker nearby — could “piggyback” on your network, or access information on your computer. If an unauthorized person uses your network to commit crime or send spam, the activity could be traced back to your account.
Wireless routers often come with the encryption feature turned off. You must turn it on. The directions that come with your router should explain how. If they don’t, check the company’s website.
Although the features of social networking sites differ, they allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messenger) that enables you to connect with other users. While the majority of these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that’s available. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.
Limit the amount of personal information you post — especially items such as your address or information about your schedule or routine.
Remember that the internet is a public resource — only post information you are comfortable with anyone seeing. This includes information and photos in your profile and in blogs and other forums.
Be wary of strangers — the internet makes it easy for people to misrepresent their identities and motives. If you interact with people you do not know, be cautious about the amount of information you reveal or agreeing to meet them in person.
Be skeptical — don’t believe everything you read online. Try to verify the authenticity of any information before taking any action.
Evaluate your settings — take advantage of a site’s privacy settings. The default settings for some sites may allow anyone to see your profile, but you can customize your settings to restrict access to only certain people. There is still a risk that private information could be exposed despite these restrictions, so don’t post anything that you wouldn’t want the public to see. Sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.
Be wary of third-party applications — third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Use strong passwords — protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you.
Check privacy policies — some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam.
Keep software, particularly your web browser, up to date — install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it.
Use and maintain anti-virus software — anti-virus software helps protect your computer against known viruses, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.
Children are especially susceptible to the threats that social networking sites present. By teaching children about internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users.
Here are a few helpful safety tips to remember when using an Automated Teller Machine (ATM):