Keep Your Identity Safe
Cybersecurity Awareness Month may have been in October, but the threat is present all year long. As a fiber-internet company, we educate our customers on the tactics used by scammers to protect their personal information from cyberattacks. Although cyber-scammers come in all shapes, sizes, and skill levels, a few common tactics include Familiarity, Copycat, and Phishing. Always double check emails for misspelled words or domains, NEVER use the link in an email or text message to login and contact someone using a verified number to confirm their identity before giving information.
Familiarity: Cybercriminals may stage a situation where you feel compelled to acknowledge that you know them somehow. You may get an email or a text message stating they remember you from an event you were recently at, like a conference. Notice if they are asking for personal information. Keep in mind these criminals are skilled at leveraging our innate sense to be polite to gain personal information used in a cyberattack.
Copycat: A more advanced technique may include the cyber-attacker impersonating the identity of someone you know to get personal information. For instance, you may receive a Facebook message from an acquaintance seemingly trying to reconnect. After a few exchanges, they may share a story that compels you to help financially by providing banking or other personal information. Social media makes it easy for criminals to impersonate anyone, so it is always a good idea to visit the profile directly to check for irregularities. Additionally, verify an organization before making a donation to avoid providing financial information to a cybercriminal instead of a charitable cause.
Phishing: Perhaps the most common form of cyberattack is the phishing email. Typically, an email is sent to the victim with an urgent call to action within a specific time frame to avoid an adverse outcome. The instructions usually include clicking a link provided in the email. Although these can be scary emails to get, always, ALWAYS verify where the email has actually come from. Look at the email address for irregularities, obscure domain names, or misspelled words. Look up the company’s phone number to verify the legitimacy of the email before taking action. If a login is required, close your browser and login directly through the site to see if any action is required for your account. : Perhaps the most common form of cyberattack is the phishing email. Typically, an email is sent to the victim with an urgent call to action within a specific time frame to avoid an adverse outcome. The instructions usually include clicking a link provided in the email. Although these can be scary emails to get, always, ALWAYS verify where the email has actually come from. Look at the email address for irregularities, obscure domain names, or misspelled words. Look up the company’s phone number to verify the legitimacy of the email before taking action. If a login is required, close your browser and login directly through the site to see if any action is required for your account.
Cybersecurity is an important part of keeping us all safe in today’s world. Follow us on Facebook or visit our website to stay in the know for all things cyber and fiber internet related.