top of page
Search

Fraudsters are Everywhere and You need to Be Viligant

  • bpage120
  • Aug 4, 2020
  • 1 min read

There are a number of steps you can do to improve your online and phone protection to avoid becoming a victim. Security Hygiene is a new term to improve your posture.

Let's categorize the areas that you can be attacked from.


Phones -

Mobile phones do not have Caller ID. You can create a directory of contacts that will help. This does not address the fact Numbers can be Spoofed. The FCC's and CRTC will require larger Telecom providers implement a concept call STIR-SHAKEN which is a suite of protocols and procedures intended to combat caller ID spoofing on public telephone networks. Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source, is a suite of protocols and procedures intended to combat caller ID spoofing on public telephone networks. Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source.


The best Practice is DO NOT ANSWER a CALL that you DON'T know. Let it go to voicemail.


Landlines


Social Engineering - The more information you publish about yourself, makes it easier for imposters to take over your accounts including Email, Banking and Other Accounts.


Critical Accounts -You must use Multifactor Authentication.

Trusted devices

Storing personal information challenge questions

Take a screen shot and store in an encrypted File

Password managers

Unique Passwords and User IDs


Ransomware

File backups Air Gapped and multiple copies

On line services such as DropBox, OneDrive


 
 
 

Recent Posts

See All

Comments


bottom of page