Tag Archives: Trustmark

Tips for Safe Online Shopping

This was sent to me via the Trustmartk Bank and thought it was worth passing this on as I believe it to be good advice to secure your online shopping experience.

Tips for Safe Online Shopping

There is good news and bad news for consumers that shop online or use a retailer’s custom mobile application.

The good news is there are plenty of available bargains online and through a retailer’s mobile app. Shopping has never been easier or more convenient. In fact, consumers are spending more than two hours per day on mobile apps.

The bad news is shopping online or with a mobile device has risks. Unscrupulous people attempt to take advantage of unwary shoppers. In the virtual world, it can be difficult to distinguish reputable retailers from criminals. Thieves can easily set up a fraudulent website or mobile app that appears to be a legitimate business and attempt to swindle you out of your sign-in credentials or credit card information.

Shopping online and via mobile apps requires special precautions:
Use familiar websites and only download apps from trusted enterprise app stores.
Use strong passwords. A complex password can be the best security defense you have.
Use a good anti-virus and anti-malware program. It is critical that online shoppers secure their devices from viruses and other attacks.
Share payment information only with known or reputable vendors.
Use a credit card instead of a debit card. Credit cards can be the safer choice for online shopping—if someone manages to intercept your financial information online, they can do less damage, and you have more recourse than if you’d used a debit card.
Make sure the order checkout area is encrypted. Make sure the vendor uses SSL (secure socket layers) technology to encrypt information. Look for the URL that begins with “https:”; instead of “http:”.
Print or save a copy of your orders and keep it until you receive your product and verify the transaction on your monthly statement.
Buyer beware. If the offer looks too good to be true, it probably is.
Approaching online shopping with a little bit of skepticism can enable consumers to reap the benefits of convenience while limiting the exposure to security threats.

Advertisements

Leave a comment

Filed under Articles

Internet Crime and the Email Compromises – Be Aware – Beware! – For All

 

 

This is an article published by the Trustmark Bank America in their Security watch letter. 

For those who are not aware of how easy it is to be hacked or blackmailed read this and you will realize you need to be very cautious about what emails you open. I know I get emails from friends in my contact list  that have died. I get bogus emails with names of my friends or acquaintances as the sender. If that is the case I always, yes always check the email address before I open it.

So I suggest you read both these articles as they could save you a lot of money and inconvenience.

 

Security Letter – Trustmark – 07/31/2017

According to the FBI internet crime complaint center business email compromise (BEC) schemes have caused at least 5.3 billion in total losses over the past three years to approximately 24,000 organizations around the world. The average loss per victim is about $218,000. Companies of all sizes and types are targeted leaving long wake of financial and emotional damage

Scammers go to great lengths to research and target employees who work with company finances. They often send emails posing as the company CEO and instruct their target to make funds transfers. There are many versions to this scam, including sending a bogus invoice and compromising an employees email account to gain more information, which is why it is important to understand how BEC works and to know where your vulnerabilities lie.

As devastating as this crime is its equally easy to avoid being exploited.

  1. Carefully scrutinize all emails. Be wary of irregular emails sent by high-level executives. They can be used to trick employees into acting with urgency. Review and verify emails that request funds transfers.
  2. Raise employee awareness. Educate employees about cybercrime and how they can help protect the company. Review company policies and encourage employees to develop good security habits.

 

  1. Verify any changes in vendor payment location by using a secondary sign off by company personnel

 

  1. Stay updated on customer habits including the details and reasons behind payments.

 

  1. Verify requests. Confirm request for funds transfers by using phone verification as part of two-factor authentication. Use previously known phone numbers, not the phone numbers provided in the email.

 

  1. Report any incident immediately to law enforcement for file a complaint with the IC3.

 

A complete list of self protection strategies is available on the US department of justice website.

If you or your company have bee victimized by a BEC scam, its important to act quickly. Contact your financial institution immediately and request that they issue a swift recall of the transfer. For domestic transfers ask you financial institution to send a ‘hold harmless’ letter to the beneficiary bank. Always file a complaint with IC3 whether the attack has been successful or not.

 

Now this next article is a must read

 

Ransomware

Ransomware Is a type of malicious software (malware) that freezes your computer or mobile device until a sum of money is paid. It can destroy personal and business files leading to stolen data and large financial losses.

  • KNOW

Ransomeware attacks – especially those that target small businesses – are evolving a complexity and are on the rise.

All devices are vulnerable but more and more mobile attacks are being reported.

Criminals collected $209 million in the first quarter of 2016

$1 Billion + in losses is projected from ransomware attacks in 2016 alone according to the FBI

Ransom fees vary from $200 – $10,000

  • IDENTIFY

Ransomware targets a specific individual within a business, or a consumer with a link or attachment that infects the computer with malware or leads the individual to an infected website. Three ways ransomware can take shape are:

  1. Spear phishing emails.

The sender appears to be someone you may know or someone relevant to your business

The message is often personalized and may include your name as a reference to a recent transaction.

  1. Advertisements or pop-up windows.

Your computer freezes and a popup message appears.

The message may threaten a loss of your files or information, or may also tell you that your files have been encrypted

  1. Downloadable software

Ransomwae is also present in downloadable games and file sharing applications.

Once the PC is infected your files are encrypted and inaccessible. The fraudster demand a ransom payment in order to unlock them.

  • PREVENT

Always back up your files and save them offline or in the cloud.

Always use antivirus software and a firewall. Be sure they are set to update automatically.

Enable popup blockers

Don’t click. Be cautious when opening emails or attachments you don’t recognize – even if the message comes from someone in your contact list.

Only download software from sites you know and trust.

Alert your local law enforcement agency as soon as you encounter a potential attack

 

Leave a comment

Filed under Articles