Con jobs 3.0: protecting yourself from scams.

AuthorGray, Bruce A.
PositionInternet awareness

Technology has provided us tools that make our daily lives more convenient. We can access data while on the move and from virtually any device that has access to the Internet; search engines help us locate answers to our questions in seconds; and handheld apps are right in our phone or tablet. Things have never been so convenient. Great, right? Yes, and no. The fact that we transmit so much data has left us with a vulnerability not experienced 20 years ago. While information is readily accessible, this makes us vulnerable to scams.

Some of these scams use the very technology that makes our lives convenient, while others simply use non-technological means to exploit the information that people can obtain via our wired lives. The availability of information will only increase as time goes on, so how can one balance the convenience and still protect themselves from scams?

  1. As professionals we have a high standard for protecting personal data of our clients and employers. But do you exercise the same caution with your own personal data? Do you carelessly discard documents containing identifying information, like your Social Security number, birthdate, name and address without shredding the document? Or even worse, do you email such data in an unencrypted format? Someone intent on taking advantage would have enough information from the above to steal your identity and possibly open credit accounts in your name.

  2. How well do you control your online presence? Social media, dating, retail and even search engines capture data about users that can be exploited. It's important to manage privacy settings, use strong passwords (differing ones for different sites) and be judicious about information provided online.

  3. Be sure you know who you are engaging when online. True email addresses and URLs can easily be hidden or appear to be from someone/somewhere else using simple, easily accessible tools. Is that email link you clicked on actually from someone you know? Was their email account hacked? Is the return email address really where it's coming from? Once someone's account has been hacked, the hacker can send email from that person's account leading you to believe that the email came from the hacked account. Be suspicious of emails with links, even from people you know. Verify where the link is going using the hover method: Place your cursor over a link in an email or on a website and most tools will show you the actual URL of the link instead of...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT