CONTACT US
800.472.1844
EMAIL US

OFFICES
29 SCHOOL STREET, LEBANON, NH 03766
264 SOUTH RIVER ROAD, BEDFORD, NH 03110
2300 FIRST STREET, #336K, LIVERMORE, CA 94550
400 EAST WALNUT ST., SUITE 128, SPRINGFIELD MO 65806

30 Apr Protect Yourself From Phishing Scams

Posted at 13:55h by Jay Hutchins 0 Comments

In recent years, we have all become generally smarter about identifying and avoiding cyber threats. Unfortunately, scammers and hackers have become more creative with their deceptive techniques. The Conservatory® takes cybersecurity issues seriously, and employs multi-tiered practices to protect members from phishing scams and other threats.

AdobeStock_23582082

While we can lessen the risk that members will fall victim to phishing scams and other cybersecurity threats, members need to diligently review communications and look for telltale signs of fraud.  Below are some tips for early recognition of these threats:

  • Be cautious about opening attachments or clicking on links in emails. Even your colleague or friends' accounts could be hacked. Files and links can contain malware that can weaken your computer's security.
  • Do your own typing. If a company or organization you know sends you a link or phone number, don't click. Use your favorite search engine to look up the website or phone number yourself. Even though a link or phone number in an email may look legitimate, scammers can hide the true destination.
  • Make the call if you're not sure. Do not respond to any emails that request personal or financial information. Phishers use pressure tactics and prey on fear. If you think a company, friend or family member really does need personal information from you, pick up the phone and call them yourself using the number on their website or in your address book, not the one in the email.
  • Turn on two-factor authentication. For accounts that support it, two-factor authentication requires both your password and an additional piece of information to log in to your account. The second piece could be a code sent to your phone, or a random number generated by an app or a token. This protects your account even if your password is compromised. As an extra precaution, you may want to choose more than one type of second authentication (e.g. a PIN) in case your primary method (such as a phone) is unavailable.
  • Back up your files to an external hard drive or cloud storage. Back up your files regularly to protect yourself against viruses or a ransomware attack. Cloud-based backup services like Carbonite are inexpensive and automatically back up all of your files.
  • Keep your security up to date. Use security software you trust, and make sure you set it to update automatically.
  • Report phishing emails and texts.
    • Forward phishing emails to spam@uce.gov - and to the organization impersonated in the email. Your report is most effective when you include the full email header, but most email programs hide this information. To ensure the header is included, search the name of your email service with "full email header" into your favorite search engine.
    • File a report with the Federal Trade Commission at FTC.gov/complaint.
    • Visit Identitytheft.gov. Victims of phishing could become victims of identity theft; there are steps you can take to minimize your risk.

You can also report phishing email to reportphishing@apwg.org. The Anti-Phishing Working Group - which includes ISPs, security vendors, financial institutions and law enforcement agencies - uses these reports to fight phishing.

 

New Call-to-action

wealth conservatory 

Recent Posts