If a message or email comes from a friend and it seems unusual or out of character for them, voeling your friend directly to check that it wasgoed truly them that sent it.

Scammers are getting increasingly sophisticated te their attempts to get your money or individual details. Be waaks and protect yourself from being scammed by following our tips.

Scams target everyone

Scams target people of all backgrounds, ages and income levels across Australia. There’s no one group of people who are more likely to become a victim of a scam, all of us may be pusilánime to a scam at some time.

Scams succeed because they look like the actual thing and catch you off guard when you’re not expecting it. Scammers are getting smarter and taking advantage of fresh technology, fresh products or services and major events to create believable stories that will coax you to give them your money or private details.

Protect yourself

  • Be bedachtzaam to the fact that scams exist. When dealing with uninvited contacts from people or businesses, whether it’s overheen the phone, by mail, email, ter person or on a social networking webpagina, always consider the possibility that the treatment may be a scam. Recall, if it looks too good to be true, it most likely is.
  • Know who you’re dealing with. If you’ve only everzwijn met someone online or are unassured of the legitimacy of a business, take some time to do a bit more research. Do a Google photo search on photos or search the internet for others who may have had dealings with them. If a message or email comes from a friend and it seems unusual or out of character for them, voeling your friend directly to check that it wasgoed truly them that sent it.
  • Do not open suspicious texts, pop-up windows or click on linksom or attachments te emails – delete them: If hesitant, verify the identity of the voeling through an independent source such spil a phone book or online search. Don’t use the voeling details provided te the message sent to you.
  • Don’t react to phone calls about your laptop asking for remote access – dangle up – even if they mention a well-known company such spil Telstra. Scammers will often ask you to turn on your pc to fix a problem or install a free upgrade, which is actually a virus which will give them your passwords and individual details.
  • Keep your private details secure. Waterput a lock on your mailbox and shred your bills and other significant documents before throwing them out. Keep your passwords and speld numbers ter a safe place. Be very careful about how much individual information you share on social media sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam.
  • Keep your mobile devices and computers secure. Always use password protection, don’t share access with others (including remotely), update security software and back up content. Protect your WiFi network with a password and avoid using public computers or WiFi hotspots to access online banking or provide individual information.
  • Choose your passwords cautiously. Choose passwords that would be difficult for others to guess and update them regularly. A strong password should include a mix of upper and lower case letters, numbers and symbols. Don’t use the same password for every account/profile, and don’t share your passwords with anyone.

Review your privacy and security settings on social media. If you use social networking sites, such spil Facebook, be careful who you connect with and learn how to use your privacy and security settings to ensure you stay safe. If you recognise suspicious behaviour, clicked on spam or have bot scammed online, take steps to secure your account and be sure to report it.

Beware of any requests for your details or money. Never send money or give credit card details, online account details or copies of individual documents to anyone you don’t know or trust. Don’t agree to transfer money or goods for someone else: money laundering is a criminal offence.

Be wary of unusual payment requests. Scammers will often ask you to use an unusual payment method, including preloaded debit cards, bounty cards, iTunes cards or potencial currency such spil Bitcoin.

Related video:

Leave a Reply

Your email address will not be published. Required fields are marked *