Site Overlay

Scams and Privacy

Updated 29/03/2020

Handy hints to protect your data

Passwords

Don’t forget to sign out

Don’t use the same password for more than one service (use a password manager)

Use a pass phrase instead of a password! Its will be easier to remember and more secure.

Don’t save passwords in web broswers or to your desktop

Change your password IMMEDIATELY if your service provider has reported a breach or hack

Emails

Use two factor authentication when given an option

Avoid clicking links in emails

Don’t open emails from people you don’t know

Don’t link everything to one email address

Web Browser

Don’t download from unknown sources! You don’t know what you really are downloading or what maybe hidden inside

Don’t open emails from people you don’t know

Data

Store your sensitive data on a local device

Back up your data on a local device and use an encrypted cloud service 

Review what you are sharing: restrict access to personal details – name, address, contact email, mobile phone number, where you work in social media and ‘Apps’.  

Factory reset your device before disposing!

Devices

Make sure you sure encrpted data 

Turn off location services 

Make sure you have a firewall and malware protection installed (for your mobile as well)

Update Update Update! As soon as there is a system or ‘App’ update out, apply it to counter security flaws and system exploits.

Rethink how you use public WiFi. Sensitive details such as banking information may be subject to attack and stolen i.e. ‘Man in the Middle’ to steal your data.

 

Types of Scams

Scams will play on your fears to scare you to pay money or provide your personal details. Scams will threaten to cut off a service, take you to court, have your arrested or be charged additional fees. Scams will often look like they come from the government or a well-known company. 

Threats

These are demands for you to pay money immediately or be cut off, arrested, increased bills.

HINT: Check if you actually do business with them! 

Remote Access

A remote access scam will try to gain access to your computer and convince you to purchase software you didn’t need. 

HINT: Whats your virus scanner found? 

False Billing

These are fake invoices often looking like the real thing. They may be for things you didn’t order or try to get you to pay an installment on a large bill. or use the phone book to call the real service provider.

HINT: Use the phone book to call the real service provider and ask if they have sent you a new invoice!

Identity Theft

These scams will try to steal your details to steal money, make accounts to gain benefits from others. 

HINT: Look at the web (URL) extension and see where it comes from. Is overseas? Is it from another source? Don’t click on the links!