Here are some examples of the different types of fraud to watch out for:
Identity theft is the most prevalent type of fraud. This crime occurs when someone gains access to your personal information and uses it to open new accounts, conduct transactions in your name or completes fraudulent purchases. Not only can there be significant financial losses for the victim, but the activity can also damage your credit. These thieves can not only obtain personal information using online resources, but can also use offline methods such as dumpster diving, stealing wallets or even stealing or rerouting your mail.
Cyber criminals want money and they will take the time to research who works in finance or accounts payable at your business. These criminals will then send an email impersonating the recipient’s boss. The content of the email will state that there is some sort of an emergency and they need money transferred right away to a particular account. In actuality, the email is fraudulent and an attempt to get you to send the criminal money.
This cyber crime involves the attempt to gain access to your employees or co-workers' information to commit tax fraud. The criminals will research your organization and determine who handles employee information and then send emails pretending to be a senior executive or someone from the legal department and request documentation with urgency. If you get an email like this that seems suspicious, always check with the person the email appears to be coming from just to make sure they actually sent it.
A type of attack that utilizes email or messaging services to trick a recipient into opening an attachment, clicking on a link, or simply to get you to fall for a scam with a promise that you will either be helping out a great cause or that you will receive money. By falling victim to these types of attacks, you risk having your computer infected or confidential information released. Attackers work hard to create convincing communications and do this by either impersonating someone you know, or acting like an organization you would normally interact with or care about. The attackers often include email addresses that look familiar or logos that appear to belong to a legitimate site, such as your bank. Phishing emails and messages are sent out to millions of people all at once in an attempt to raise the chances of success. Just like using a net to catch fish, attackers do not know what or how much they will catch, but they know that the bigger the net, the more fish they are bound to find.
Social engineering is an attack that relies heavily on human interaction and it often involves tricking people into breaking normal security procedures. Attacks can include Phishing, Spear Phishing, Pretexting, Ransomware or Baiting. For organizations, it is recommended that penetration tests are performed on a regular basis, using social engineering techniques to help learn what types of attacks cause the most weaknesses and what users cause the most risk. It is also a great opportunity to identify areas or employees that require additional training. Security awareness is critical in preventing successful social engineering attacks.
Elder Abuse Fraud
Financial or material exploitation often can involve the mistreatment or exploitation of property, possessions or assets of adults without consent, under false pretense, or through coercion and/or manipulation. Financial exploitation is a fast-growing form of abuse of seniors and adults with disabilities. Situations of financial exploitation commonly involve trusted persons in the life of the vulnerable adult, such as:
• Family Members
• Friends & Acquaintances
• Doctors & Nurses
Protecting Your Home
Most homes have devices linked to their wireless networks, including computers, laptops, gaming devices, TVs, tablets and smart phones that access the Internet. To protect your home network and your family, you need to have the right tools in place and confidence that you can use the Internet safely and securely. Below are some tips for keeping your home network and family safe.
Protecting Your Business
No matter how small or large your business may be, it is a target for potential hackers. How can you keep your business network secure? Here are a few tips to keep in mind:
The Federal Trade Commission Offers Free Security Guides
Would you like to learn more about how you can protect yourself, your family and your business? The Federal Trade Commission (FTC) offers valuable free guides to keep you safe. Check out a few of the FTC's resources below: