To help safeguard your information, if you get an unrequested phone call:
- Do not provide or "confirm" any of your
personally identifying information.
- Never read back a one-time security passcode
(unless you have initiated the service call to a company's official phone
number).
Here are more steps to protect against scams and identity theft.
Stay vigilant against
phishing!
Phishing is a technique criminals may use to try to trick you into giving
them your personal information—information that they may then use to try to
steal your identity. They often do this by impersonating a company or
institution, and then asking you to click on a link, open an attachment, or to
"confirm" your date of birth, Social Security number, or account
credentials.
Even if you feel confident in your ability to spot a scam, it's important
to stay vigilant in your daily life. Most phishing attempts are carried out by
email, text message, or phone. Here are several warning signs that should raise
suspicion:
Warning signs of phishing attempts
- Someone contacting you to say that you have won an
award or freebie.
- Someone contacting you with a deal that sounds too
good to be true.
- Phone calls, emails, or texts that claim to be
from the IRS.
- Unusual communication from someone asking for
help.
- Unusual communication (that may sound legitimate)
claiming to be from a company you work with.
- Communication
from an unfamiliar email address or phone number.
Remember that phishers may use urgent-sounding language to try to get you
to click on a link or attachment right away—before you have time to think it
through. To create this sense of urgency, they might claim that something very
good has happened (like you've won some money), or that something very bad has
happened (like you're in debt with the IRS). Be suspicious anytime you receive
an out-of-the-ordinary text, call, or email that makes such claims.
Here's how you can protect yourself, particularly if you've received a
suspicious or unexpected communication:
Protecting yourself against phishing attempts
- Stop communication with the phisher immediately.
- Hang up the phone or ignore the suspicious email
or text.
- Do not click on any links or download any
attachments.
- Do not provide or "confirm" any of your
personally identifying information.
- If you think the communication could be a
legitimate request from a company you do business with, hang up and then
call the company directly.
- Never
grant remote access to your computer or read back a one-time security
passcode (unless you have initiated the service call to a company's
official phone number).
Protect your phone
service.
Think of how protective you are with something like your Social Security
number. You know that if a criminal were to obtain it, they might be able to
take out a credit card in your name, obtain your tax refund, or even worse.
Increasingly, your cell phone account is becoming something you need to
protect just as diligently. If criminals can gain access to your phone calls
and text messages, they can potentially steal one-time passcodes and break into
your accounts.
For example, one way they may do so is with "SIM swapping." (A
SIM card is a small plastic card that stores identifying information on your
cell phone, and that allows you to make and receive calls.) With this scam, a
fraudster may call your cell phone provider pretending to be you, saying that
you have a new SIM card to activate. If the scammer already has some of your
personal information (like the last 4 digits of your Social Security number,
your date of birth, or your password for your mobile provider account), they
might be able to convince the cell phone carrier that they are you and get your
phone number reassigned to their SIM card.
Here are several warning signs not to ignore:
Warning signs that your phone has been compromised
- You stop receiving phone calls and text messages.
- Your phone says "no service" or
"emergency calls only."
- Restarting your phone does not restore service.
- You
receive emails from your cell phone provider about changes to your
account.
-Fidelity Viewpoints
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.