The Federal Trade Commission received more than 2.1 million fraud reports from consumers in 2020, according to newly released data, with imposter scams remaining the most common type of fraud reported to the agency.
Online shopping was the second-most common fraud category reported by consumers, elevated by a surge of reports in the early days of the pandemic.
Consumers reported losing more than $3.3 billion to fraud in 2020.
When it comes to protecting your accounts, you are most likely already using some type of
password. There are several ways to authenticate yourself into an account: something you have,
something you know, something you are, somewhere you are.
While no sole step will stop all cyber criminals, one of the most important steps you
can take is to enable something called two-factor authentication on your most important accounts.
As online learning becomes increasingly prevalent in schools and universities, it is important to understand some basic cybersecurity steps that students, parents, faculty and staff can take to help make sure they move to the top of the class securely.
Make sure you use your cloud services properly. How you access and share your data can often have a far greater impact on the security of your data than anything else.
How can you tell if you’re dealing with a debt relief scammer? Because they ask you to pay them before they do anything for you.
Scammers try to take advantage of those dealing with debt – but there’s legitimate help out there.
Many of the crimes that occur in real life happen on the internet too. Credit card fraud, identity theft, embezzlement, and more, all can be and are being done online.
Seniors are considered easy targets by criminals because they might not know how to report cybercrimes against them.
Mobile apps enable us to be more productive, communicate and share with others, train and educate, or just have more fun. Here are steps you can take to securely use and make the most of today’s mobile apps.
How Do Phone Call Attacks Work?
First, understand that these criminals are usually after your money, information, or access to your
computer (or all three). They do this by tricking you...
The goal of maintaining personal privacy is managing your digital footprint, i.e. - attempting to protect
and limit what information is collected about you. Be aware that in today's digital world, it is almost
impossible to eliminate your digital footprint or stop every organization from collecting information on
you; we can only reduce it.
Your personal information exists in numerous places all over the internet. Assume that some information about you is already available to criminals and consider what you can do to slow down or detect the use of your information for fraud.
Now What? - How to Take Back Control
If you suspect you have been hacked, stay calm; you will get through this. If the hack is work-related, do
not try to fix the problem yourself; report it immediately. If it is a personal system or account that has
been hacked, here are some steps you can take:
It’s well known that people online aren’t always as they appear. However, tens of thousands of internet users fall victim to online romance scams each year. These scams can be incredibly convincing and are increasingly found across dating sites and social media platforms.
By appealing to victims’ emotions and feigning personal connections, scammers will try to steal large sums of money and personal information. Luckily, there are ways to identify a scam and protect yourself online.
Millions of people are unaware of and uninformed about how their personal information is being used, collected or shared in our digital society. Data Privacy Day aims to inspire dialogue and empower individuals and companies to take action.
To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network.
Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it
can be especially challenging for family members not as used to or as familiar with technology.