Data protection Archives - WebSur https://www.webassured.com/category/data-protection/ Online shopping security Wed, 08 Mar 2023 23:42:01 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://www.webassured.com/wp-content/uploads/2023/03/cropped-Screenshot-2023-03-09-at-02-09-06-Logo-Maker-Used-By-2.3-Million-Startups-1-32x32.jpg Data protection Archives - WebSur https://www.webassured.com/category/data-protection/ 32 32 Virtual Card. Payment with Virtual Card https://www.webassured.com/virtual-card-payment-with-virtual-card/ Wed, 30 Jun 2021 20:15:00 +0000 https://www.webassured.com/?p=137 A virtual card is a card designed only to pay for purchases and make payments on the Internet. Such cards cannot be used at ATMs. A virtual card can have no tangible medium and be issued electronically for specific purchases or transactions, or it can be issued on a tangible medium. It works without a...

The post Virtual Card. Payment with Virtual Card appeared first on WebSur.

]]>
A virtual card is a card designed only to pay for purchases and make payments on the Internet. Such cards cannot be used at ATMs. A virtual card can have no tangible medium and be issued electronically for specific purchases or transactions, or it can be issued on a tangible medium.

It works without a PIN-code. The following parameters are used for payments: card number, its expiration date and three-digit code to check the authenticity of the card. Card payment system Mastercard has a code called CVC2.

The use of such cards for payments via the Internet increases the security level of the transactions executed, since the virtual card allows not to disclose the main card details.

When you create a virtual card, you set a limit on it yourself. For example, you need to buy a TV for 400 dollars at an online store, but you don’t want to enter your bank card data for fear of fraud. Then you should create a virtual debit card with a $400 limit and pay for the purchase. No one else will be able to use this debit card later, since the limit on it has been used up. You can set a limit on the card that is higher than the cost of online purchases. In this case, you can set a one-time debit limit, which cannot be exceeded, which also reduces the risk of fraud. The card can be blocked or deleted at all.

Virtual cards are issued in U.S. dollars and euros and come in single-use and multi-use versions. Their validity may vary from one day to several years. Virtual cards can be purchased not only at bank branches (in the form of a plastic card) but also via the Internet, ATMs, or mobile communications (without a tangible medium). You can replenish the virtual card in the bank branches or through remote banking systems. Banks can set limits on the amount and number of operations performed on the virtual card per month.

The post Virtual Card. Payment with Virtual Card appeared first on WebSur.

]]>
Shopping via Smartphone – How to Secure Payments https://www.webassured.com/shopping-via-smartphone-how-to-secure-payments/ Tue, 13 Apr 2021 21:44:00 +0000 https://www.webassured.com/?p=128 The number of online shopping scams and identity thefts increases every year. While hackers and fraudsters are perfecting new methods, many mobile device users still don’t know the simple rules of safe online shopping. You don’t have to be one of them. Read on and take precautions to protect your hard-earned money and shop safely....

The post Shopping via Smartphone – How to Secure Payments appeared first on WebSur.

]]>
The number of online shopping scams and identity thefts increases every year. While hackers and fraudsters are perfecting new methods, many mobile device users still don’t know the simple rules of safe online shopping.

You don’t have to be one of them. Read on and take precautions to protect your hard-earned money and shop safely.

How online shopping puts you at risk

Shopping online may seem safe, but that’s far from the truth. It takes two things to be safe: an online store that cares about customer safety, and smart consumers who know how to protect their personal information.

Hacking and identity theft are not as visible as traditional theft, and hackers are harder to catch. However, millions of people fall victim to online theft each year. You don’t have to be one of the victims. With a few simple rules and tricks, you can shop safely on your smartphone.

Basic rules to prevent online fraud

  • Only shop on HTTPS sites

Make sure that the online store you visit uses HTTPS. This means that your data is protected by basic TLS encryption all the way from your browser to the site where you shop. HTTPS sites aren’t necessarily super-secure, but if an administrator has implemented HTTPS to protect your data, you know they’ve taken at least one important step. It’s easy to check – just look in the address bar to see if there’s a padlock icon next to the web address. If the Web site is unsafe, you’ll see a circle with an “i” on Android devices and an “Unsafe” message on iOS.

  • Make sure you’re visiting a legitimate online store

Before you enter any personal information to complete your purchase, make sure you’re at the right online store. Hackers and scammers have many opportunities to redirect you to the wrong website or, in other words, spoof the URL. You might think you’re buying new sneakers directly from Nike, but you ended up at “n1ke.com” (hypothetical example). If that’s the case, it’s time to delete everything you just entered and back off!

  • Be careful with URL shorteners

Marketers love URL shorteners because they make long URLs filled with tracking codes less unsightly. However, scammers can also use URL shorteners to hide the URL they send you to. When you see ads with an abbreviated URL, consider going to the brand’s website yourself by simply using the address bar. Chances are, you’ll find the same deal on their site. Otherwise, it’s possible that the URL abbreviation you listed was used by a scammer. There’s nothing wrong with clicking on a shortcut, but if you do, make sure the URL you go to looks legitimate.

  • Avoid links in emails

Another method that scammers can use to get your credit card information is phishing. This is a very popular and effective way to “hack someone” using carefully crafted emails. They usually offer you discounts or offers that are hard to refuse. They may also include a fake URL that will take you to an order page and make the scam even more convincing. Whenever you get an email like this-especially on Black Friday, Cyber Monday, or just before New Year’s Eve-ask yourself the following questions:
What are they asking for? Most legitimate websites won’t ask you for more information after you make a purchase. If an email asks you for a password or some information that should already be on the site, it’s a scam.
Where do these links lead? You’d better not click on any links in the email before you check the URL they sent you. Does it use the same domain name (“paypal” for www.paypal.com) and top-level domain (“.com” for www.paypal.com)? You can hover over the link or right-click on it before you click on it to see where it leads.
Who is the sender? Anyone can set their visible name as “Paypal.com” or “SberBank,” but only an employee of these companies can use an email address ending in @paypal.com Make sure you research their email address carefully before trusting them.

  • Never shop on public

Wi-Fi networks If possible, never shop online on public Wi-Fi networks. Public Wi-Fi is an ideal place for scammers and hackers to operate. These networks have low security and can be scanned by hackers looking for weak connections. If you absolutely must use public Wi-Fi, install and run a VPN on your smartphone. An encrypted connection ensures that your online banking or credit card credentials are safe when you click “Buy.”

  • Keep track of your debit and credit card statements

This may seem obvious, but you should always keep track of your purchases and their prices. This can help you spot potential hacks or dishonest business practices so you can react as soon as possible. Legitimate companies may manipulate discounts or add hidden fees that will be charged to you after you complete your purchase.

If you use the banking app, turn on push notifications to keep track of the payments you make. You can even call your bank to see what other notification options are available, or simply order your debit card or credit card statements. Pay attention to fraudulent payments. When you see them, contact your bank to dispute the charge and close the card. This will make the leaked information useless in the hands of a hacker.

  • Consider using a virtual credit card

A virtual card is exactly what it looks like – a purely digital bank card that can only be used online. By linking it to a real credit or debit card you own, you can make purchases online without even revealing the actual card information. You can also set up your virtual card so that it only allows you to make purchases for a certain amount or expires after a certain day.

  • Update your browser regularly

Your browser is what takes you from one online store to another. That’s why it’s important to keep it updated to take advantage of the latest security improvements and bug fixes.
There are many hacking techniques that target the vulnerabilities of outdated browser versions or unprotected online stores. After all, updates are usually released to fix known vulnerabilities. Don’t give hackers a chance and stay informed.

  • Practice strong password protection

Good password protection is always important, but it’s easy to forget that when you create new accounts to shop at different online stores. Creating unique and secure passwords for each site (and remembering them) can be tricky, but there are tools that can help you – password managers.

  • Shop only from trusted apps

When using shopping apps, be sure to download them from official sources: the Play Store for Android users and the App Store for iOS. Avoid downloading apps from suspicious sites, as this is an easy way to get malware on your smartphone. However, not all apps in official stores are trustworthy. We recommend always checking reviews and looking for more information about the developers.

The less information you provide, the better After making a few purchases on trustworthy websites, you begin to understand what data they require:

  • Your payment information;
  • The address where you want them to ship your product;
  • Your name and contact information.

If a website asks you for more personal information, turn around and leave. Some websites ask for additional information for marketing purposes, but this is not required. No website should ask for your personal identification number or password to access another site or service in order to sell you something. If they ask, turn around and run – you’re probably about to be scammed. One last piece of advice – always be vigilant. If something sounds too good to be true, it’s probably a scam.

The post Shopping via Smartphone – How to Secure Payments appeared first on WebSur.

]]>
What are the Dangers of Public Wi-Fi Networks and How to Protect Your Data https://www.webassured.com/what-are-the-dangers-of-public-wi-fi-networks-and-how-to-protect-your-data/ Thu, 06 Aug 2020 06:03:00 +0000 https://www.webassured.com/?p=134 We asked information security specialists to explain to us the rules of hygiene. Ever since we were children, we know that we have to wash our hands when we come in from the street. But we don’t think much about the fact that by the same principle (“from the street”) our mobile devices can also...

The post What are the Dangers of Public Wi-Fi Networks and How to Protect Your Data appeared first on WebSur.

]]>
We asked information security specialists to explain to us the rules of hygiene.

Ever since we were children, we know that we have to wash our hands when we come in from the street. But we don’t think much about the fact that by the same principle (“from the street”) our mobile devices can also get sick. More specifically, your data can be stolen.

How to protect yourself from sly crooks taking advantage of the naivety of fans of free public Wi-Fi? We asked information security experts to explain to us the rules of hygiene.

I’m not afraid of anything, because I use strong passwords.

Difficult passwords are fine, but they can still be cracked. It just takes longer for programs to figure out the key relative to “qwerty12345”. In the case of Wi-Fi hotspots, the password has nothing to do with it, even if it contains over twenty characters, alternating Cyrillic/Latin, special symbols and numbers. The vulnerability appears at the moment when the device joins a public network.

Consider also that gadgets can automatically connect to known networks. For example, you went to a cafe and used a local hotspot, getting the password from the waiter. The next time you go in, your smartphone or laptop will connect to that network when Wi-Fi access is enabled. Moreover, in some establishments or public networks there is not even a password – anyone can connect.

What is the danger of automatic connection?

With the right skills an intruder can easily access the data from the computers connected to the point. Attackers can also create a doppelganger – a network with the same name (network ID, SSID) and password. Of course, there is no guarantee that the connection will be made to the “evil twin”, but this variant is possible: for example, such a network can have a stronger signal and you have an automatic connection installed or you will just be unlucky when choosing between two networks with the same name.

By pairing your device to a rogue network, you run the risk that the data sent from your gadget will fall into the wrong hands. Your accounts and bank cards are at risk, as well as information from the drive if viruses were able to leak into your computer.

So the first tip is to disable automatic connection to known networks in your device settings. This item is usually found in the wireless access settings.

You can recognize the twin only by indirect signs. Firstly, the browser can warn you of the potential danger when opening pages: by displaying an encryption error message or simply by not opening the site. Secondly, sometimes substituted pages are not always identical to the original. If suddenly you see different fonts on a familiar resource (and you did not change them in your browser), there is no animation or it is not the same as usual – this is a serious reason to beware.

With an “evil twin” a fake site may have the same URL as the real one. The malicious user will simply give you a fake site using his DNS.

We recommend that you change your DNS servers to Google’s DNS servers when connecting to a public network.

In practice, it is almost impossible to identify a twin. It is impossible to patent or license an access point name. Anyone can deploy access points with any name, even if similar ones already exist.

So what to do?

If your mobile operator has a financially acceptable plan, then use the Internet from your smartphone, and if necessary, distribute traffic to your laptop. But this is not always possible – say, when traveling abroad. You can go broke on Internet roaming traffic.

The first rule of working safely on public networks: never connect to public networks. The second rule of working safely on public networks: never connect to public networks at all.

If you really need to, follow these rules:

  • Don’t use a public network to access mail, social networks, online banking and other important services. Searching on Google, watching YouTube is acceptable.
  • “Proper” public networks should have an authorization page – you enter your phone number there, they send you a code.
  • Check the certificate on the network’s authorization page. If the network does not have an authorization page, do not connect to it.
  • The certificate on the authorization page must be trusted.

Okay, then what NOT to do?

  • Try not to shop online or enter passwords while your device is connected to a public hotspot.
  • As cliché as it sounds, make sure no one can see what password you are entering. Just in case, check to see if there’s a security camera above you.
  • Do not connect to networks that do not require a password at all. The “MTS_wifi_free” may not be an access point of a well-known operator, but just a bait for gullible people.

The user should understand that when connecting to an open Wi-Fi network in a subway, hotel or airport, his data could be intercepted by an intruder. The risk of such connection is high, that’s why we advise against using Wi-Fi networks that do not have a password. Such networks are easy to connect to and just as easy to intercept any user’s data. Attackers with basic hacking skills can easily intercept traffic, including users’ passwords from Internet banking, email, etc.

And one more tip – when connecting, pay attention to the type of encryption: ideally, WPA2-Enterprise should be used.

What kind of encryption is this, and why do I need to know about it?

The type of encryption in Wi-Fi is a characteristic that has to do with the security of the network, not the user. The more complex the type of encryption, the harder it is to pick a password to access.

WEP encryption is the least secure because it transmits several bytes of the encryption key along with each data packet. Consequently, regardless of the complexity of the key, any transmission can be exposed by intercepting a sufficient number of packets. Using special software, the task will take a few seconds.

The strongest type of encryption is WPA2 (IEEE 802.11i). It uses the AES encryption standard (128-bit block size, 128/192/256-bit key) that is resistant to tampering. There are two varieties of WPA2:

WPA2-PSK (Personal) – login to the network is by a single password for all clients; WPA2-Enterprise – password is checked against a remote database on a third-party server. The password is unique for each node. As far as I know, no one has been able to crack WPA2-Enterprise yet.

WPA2-Enterprise encryption is available only in the corporate environment, and to rare users. This type of encryption requires an additional RADUIS-server – a separate protocol for the implementation of authentication and authorization.

WPA2 PSK (or WPA2-Personal) encryption has one key for all, this is convenient for home use, as usually all those connecting are trusted users. However, using WPA2 PSK in public places can lead to loss of sensitive data. Users should also avoid Wi-Fi access points if they have WPS enabled. This is a technology that is specifically designed to make it easier for devices to connect to a Wi-Fi network. An intruder can penetrate such a network, even if it uses strong encryption.

How else can I protect myself?

Use a VPN, also known as a virtual private network. It’s a generic name for technologies that are used for different purposes. For example, you can use a VPN to switch your location to access blocked resources in your country (let’s pretend we don’t know what sites we’re talking about).

In short, a VPN is a network inside a network. Imagine an oil pipeline with a cocktail pipe inside it – that’s what a VPN is. The technology forms a separate encrypted channel through which data is transmitted. If you want, of course, you can hack it too, but it’s not easy to do.

Also try to open sites starting from “https://имя domain”. HTTPS is an extension to the HTTP protocol, which allows for encrypted data transmission. Many resources, especially the larger ones, support it.

Some resources also use SSL to transfer information between the server and the client. It is considered secure even on public networks.

Conclusions

The basic rules of hygiene are as follows:

  • If possible, do not connect to public Wi-Fi, and when it is unavoidable, choose the password-protected networks and use a VPN
  • Do not make purchases or enter passwords to log in to accounts on resources when your device is connected to a public network without an urgent need.

The post What are the Dangers of Public Wi-Fi Networks and How to Protect Your Data appeared first on WebSur.

]]>
Why are Software Updates Important? https://www.webassured.com/why-are-software-updates-important/ Mon, 09 Dec 2019 06:59:00 +0000 https://www.webassured.com/?p=131 Often we all see warnings that “updates” or “software update needed” are available. How often have we just clicked “cancel” because an update popped up at an inconvenient time? Chances are, you most likely, put off downloading the latest updates until the next day, week or even month. Delaying the installation of updates can play...

The post Why are Software Updates Important? appeared first on WebSur.

]]>
Often we all see warnings that “updates” or “software update needed” are available. How often have we just clicked “cancel” because an update popped up at an inconvenient time? Chances are, you most likely, put off downloading the latest updates until the next day, week or even month. Delaying the installation of updates can play a cruel trick.

It is very dangerous to think that updates are a waste of time, or that they are not important, or to turn them off altogether. This is a mistake that can cause security risks, such as giving attackers access to your personal information and provoking identity theft. Not to mention updating your antivirus software databases to protect your computer.

Recently, multiple security breaches affecting many users have been identified. Unupdated computers have fallen victim to cybercriminals. Updating your software is important because updates include critical fixes for malicious vulnerabilities, protecting against them. Many “high-profile” attacks could have been prevented if updates had been installed in time.

An update is a set of software changes, fixes, or improvements. However, patches do not always work correctly and new problems can unintentionally appear. Therefore, it is important to test the system before and after an update. Some argue that updates are the most important aspect of enterprise security and the best measure to combat software vulnerabilities.

Attackers can exploit security vulnerabilities in several ways, such as writing code for a targeted vulnerability that may be hidden within the malware. By browsing a Web site, opening a compromised message, or transferring data on infected media, exploits can infect your computer without any action on your part. Malware on someone else’s computer on the same network can also exploit vulnerabilities to infect your computer over the network. Regular updates are necessary to prevent this.

In addition to security patches, software updates can include driver updates, improved compatibility with various devices and applications. Updates can improve software performance, fix known bugs and remove outdated features that take up hard drive space. Developers are constantly adding new and improved features. Updates are available for both the operating system and individual programs, and are very important for their security and stability. Many of the most dangerous malicious attacks can exploit software vulnerabilities in most common applications and browsers.

Instead of ignoring or procrastinating, install software updates. You can set it to automatically download and install updates. Installing regular updates is integral to protecting your personal information and keeping your computer running and safe.

The post Why are Software Updates Important? appeared first on WebSur.

]]>
Simple Tips to Improve Password Security https://www.webassured.com/simple-tips-to-improve-password-security/ Thu, 12 Jul 2018 00:33:00 +0000 https://www.webassured.com/?p=125 These elements relate mostly to password management when we talk about the identity perspective. Even though it’s not a topic that people like to discuss, it’s still extremely important that you consider it in your security plan. They are the first line of defense for your emails, accounts and anything else you need. Any malicious...

The post Simple Tips to Improve Password Security appeared first on WebSur.

]]>
These elements relate mostly to password management when we talk about the identity perspective. Even though it’s not a topic that people like to discuss, it’s still extremely important that you consider it in your security plan. They are the first line of defense for your emails, accounts and anything else you need.

Any malicious activity done on your source space is instantly detected through your password. We often hear people talk about the importance of strong passwords. It is also widely known that websites with password criteria are difficult to hack. You have to make sure of this if you are a manager or provide services to people. Any client you work with can achieve highly effective tactics to prevent malicious activity.

How do you create a strong protector of your personal data?

Suppose you want to reduce the risks that can occur on a platform without code. Always verify the data you enter on it. You should follow the basic steps provided to you by your security provider. Moreover, you should constantly update your system if you check data frequently, as this will help you avoid any threat to the security of your system, email or website. The following five methods will help you secure your mobile app system, while you need to verify your data and strengthen your existing security.

Working with a secure app manager

The first thing you need to secure on your system is your app. Native apps created with no-code platforms are highly vulnerable. You need to make sure that they are not exposed to security threats through email. If you compare your native app to web apps, you’ll find a significant difference between breach and security. A common mistake people make when building a native app without code is to ignore the idea of securing it.

Limitations set by the platform

Every code-free development application comes with some limitations. Consequently, you must understand these limitations in order to achieve a high level of security. You need to be aware of the different approaches to changing passwords in a no-code platform such as AppMaster. These approaches are case scripting, GEO location support, and encryption. These methods play an important role in development. Distributing a mobile app happens in the right way. If you have a goal of running on an iOS system, you need to follow certain tips to ensure that your app is available on the ideal platform with the best user experience.

Protecting network connections

You need to protect not only your mobile app, but also the server that provides the network to the app. You need to ensure that there is no unauthorized access to the server. To do this, you use API access to protect the information. If you’re still not comfortable with this, you can also use VPNs and other encryption options to secure your server.

Make sure that all data is encrypted

By encryption, we mean everything, both small fields and big data. To you, this may not seem like a big deal. However, the data stored on your server is vital to identifying your audience. If you keep the passwords for data changes intact and encrypted, even if hackers manage to break through, they won’t be able to do anything with the data. The great thing about encryption is that no one can break into sharing without having the key given to the user. If you are willing to share your data with certain businesses, you will generate a shared key for encryption. The data sharing doesn’t end there. Misuse of keys is virtually impossible.

Try to prevent data leaks

It’s the same as with any other application. Before you join, you have to follow the permissions given by the application. The idea is to make sure that the coding done on the platform is transparent and not misused by the general public.

Tips for creating a strong password

Creating strong passwords is necessary to protect our identity online and to avoid becoming an easy target for hackers.

  1. Create unique passwords

The best thing to do when you are about to change passwords is to make sure that they are memorable but still difficult to crack. In typical cases, passwords that contain at least 12-20 characters are considered strong. You can add more characters at your discretion. At the same time, you should also include numbers and symbols depending on your choice.

If you plan to make it even more secure, you can crack a phrase that is unique to you instead of going through the characters. You can divide these phrases by characters and start your word with a capital letter. This will allow you to create a long, strong, memorable password that hackers can’t easily crack.

  1. Use different passwords for different accounts

People who have multiple profiles created on many social media platforms prefer to create similar passwords. This is because they think it will be easier and faster to access their platforms. However, this is not recommended and can be extremely risky. Imagine if someone managed to get through one of your accounts and gain access to all of them. It doesn’t matter if you’ve set up a strong Facebook password or bank accounts.

  1. Consider using a password manager

Web site and password managers often store login information. They are used to log in automatically. This avoids reusing your password, and you can log in with a single click. However, it is recommended that you set a master password on your account. This is done by connecting your accounts to one account for which you can create a master password.

  1. Update passwords

Suppose you want to make sure your account is always secure. Your chances of being hacked increase every year if you keep your password constant.

  1. Two-Factor Authentication

Two-factor authentication functions as an extra layer of protection for your security. Even if someone breaks into your account and breaks your password, they will have to authenticate with your security device. This means that you can easily only use authentication on your original device. This way, hackers have less chance of gaining access to your accounts.

Questions:

How do I choose the best approach to improve password security?

Some tips for protecting passwords include:

  • Use a password that is at least eight characters long.
  • Avoid using non-genuine terms.
  • Use uppercase and lowercase letters.
  • Use numbers and special characters whenever possible.
  • Do not use personal information.
  • Use random patterns rather than sequential or “ordered” patterns.

What are the three basic approaches to protecting passwords?

  • Store passwords offline in a secure location.
  • Save passwords online.
  • Download and install anti-virus software.

What is the most secure way to store passwords?

Desktop applications like AppMaster always keep your passwords secure. All of your encrypted versions of passwords are stored in a digitally managed vault. It can generate a master password for all your accounts.

Where should I store my passwords?

To understand, imagine writing down your password on a piece of paper and storing it in a safe place. The best option is to create a master version through Application Master.

Is it okay to write down my password?

Yes, writing down all your passwords on a piece of paper and hiding them at home is safer than using a password manager. A written down password is more likely to be reused.

Final verdict

There is currently a huge market for mobile apps and the need for passwords. A large market share ultimately exposes them to threats and risks of data breaches. Any business that plans to succeed should adapt innovative app development platforms such as AppMaster. AppMaster can protect your media, data and all the important information relating to your business and its customers. If you want to generate a master password to secure your accounts, AppMaster is your best choice for code-free development.

The post Simple Tips to Improve Password Security appeared first on WebSur.

]]>
Identity Theft: What is it and How Can You Prevent It? https://www.webassured.com/identity-theft-what-is-it-and-how-can-you-prevent-it/ Wed, 24 May 2017 04:24:00 +0000 https://www.webassured.com/?p=122 Identity theft is when someone steals your personal information and uses it without your permission to commit fraud, such as making an unauthorized purchase or getting credit in your name. Personal information includes things like your name and address, Social Security number, bank account number, credit card number or driver’s license number. Identity theft is...

The post Identity Theft: What is it and How Can You Prevent It? appeared first on WebSur.

]]>
Identity theft is when someone steals your personal information and uses it without your permission to commit fraud, such as making an unauthorized purchase or getting credit in your name. Personal information includes things like your name and address, Social Security number, bank account number, credit card number or driver’s license number.

Identity theft is the fastest growing white-collar crime in the United States. One case of identity theft occurs every two seconds. It affects millions of people and costs billions of dollars each year.

Assess Your Risk of Identity Theft

One of the following actions or inactions could put you at risk of becoming a victim of identity theft:

  • Carelessly throwing away bank statements, credit card offers and receipts without destroying them.
  • Providing your Social Security number without asking how that information will be used and what safeguards are in place to protect its disclosure from unintended targets and individuals.
  • Carrying your Social Security card in your wallet.
  • Constantly sharing personal information on frequently visited sites such as social media or financial sites.
  • Forgetting to log out when doing online banking or when visiting social media sites in public places such as the library, hotel or coffee shop.
  • Using public computers to wirelessly access the Internet to your personal accounts.

How thieves get your information

There are many ways thieves can access your information, such as your payment and financial records or paycheck stubs. They will go through your junk to find credit card bills, canceled checks and pre-approved credit card offers. So any bills or records you toss in the trash should be destroyed before doing so.

The three most common types of information-gathering scams are Vishing, where you are tricked into providing information over the phone, Phishing, where you are sent an email or text message containing a fraudulent link to a website through which malware or spyware is inserted. into your computer in order to steal passwords and other personal information. You may also be vulnerable to identity theft from the information and updates you share on social media sites.

Identity theft puts your credit and credit cards, bank accounts, school and business enrollment at risk.

How to protect your assets

With all of these risks, the question remains: how should you fully protect yourself from the risk of identity theft? First, don’t give your Social Security card or phone number to anyone who asks for it. While this goes without saying, you may find yourself in a situation where it may seem prudent and necessary to hand over your Social Security number. However, you should never give your Social Security number to an unverified source.

Checks and Credit Cards

It is highly recommended that only your first and last name be printed on checks, and make sure you do not have a home phone number. If you really want to put a number on your checks, then choose your work number. Also, make sure you close all inactive bank accounts.

When it comes to your credit cards, you should check your credit report annually to check for discrepancies or any payments you don’t remember making. After all, you are entitled to one free report per year from the major credit reporting bureaus. Be sure to properly dispose of any credit cards that have expired.

Phone, computer and passwords

This may go without saying, but we will still say, never give any personal information over the phone. Also, if you have children, you should also teach them what to say and what not to say on the phone. And, when it comes to your cell phone, you should add a code or lock to it. Most smartphones allow you to create a 4 or 5 digit password.

In this digital age, it’s getting easier and easier for people to steal your information from your home computer or laptop, so you should invest in a modern anti-virus and firewall program. In addition, you should avoid sharing personal sensitive information on social networking sites. Sure, we all like to post status updates, but nothing about your salary, mortgage, bank accounts, Social Security number, address or driver’s license. Finally, if you ever decide to change your computer to a new one, make sure you clear it of all your personal information.

Of course, when it comes to computers, you have a lot of passwords. Keep them simple, nothing that can be easily guessed just by looking at your address, social media profiles, or date of birth. Stay away from something like “Password1” or “ABCD123.” You should also change your passwords periodically.

If you are a victim of identity theft

We recommend that you:

1) File a police report (make sure you keep a copy of the report for your own records)
2) File a fraud notice with all three national credit bureaus: Equifax, Experian TransUnion.
3) File a complaint with the Federal Trade Commission (FTC). The FTC places all complaints in its database, which is used by law enforcement. Save all the evidence. You need to build a case to present to your creditors, don’t discard anything. Keep detailed records of your conversations and the people you talk to, as well as copies of all correspondence.

The post Identity Theft: What is it and How Can You Prevent It? appeared first on WebSur.

]]>
7 Simple Ways to Protect Your Finances from Scammers https://www.webassured.com/7-simple-ways-to-protect-your-finances-from-scammers/ Thu, 04 Feb 2016 19:16:00 +0000 https://www.webassured.com/?p=119 We trust digital services with everything: storing our memories, monitoring our health, and accessing our finances. But now that various apps, marketplaces, and streaming platforms have our payment data, there is a fear of them falling into the hands of fraudsters. Here’s what to do to keep your money safe. Check your accounts regularly This...

The post 7 Simple Ways to Protect Your Finances from Scammers appeared first on WebSur.

]]>
We trust digital services with everything: storing our memories, monitoring our health, and accessing our finances. But now that various apps, marketplaces, and streaming platforms have our payment data, there is a fear of them falling into the hands of fraudsters. Here’s what to do to keep your money safe.

Check your accounts regularly

This way you can immediately spot unauthorized transactions, transfers to strangers or organizations. To avoid setting an alarm clock to check card balances, turn on SMS or Push notifications from your online bank.

For online purchases, you can have a separate card and use it for all financial transactions.

Periodically change account passwords

If you use payment services, create unique passwords for each account and update them regularly to prevent someone from hacking your account or leaking personal information. You may use special online services to create passwords: online password generator or your own strong password generator that is built into your device’s software.

Be careful with online transactions

When shopping online, make sure the site or store is secure and the online connection is secure. Indicators of a secure site include a secure URL (beginning with https://), having reviews for the site, and connecting a familiar payment system. Before you make a purchase from a store on Instagram, verify its existence legally. Try not to transfer funds to personal accounts when making such purchases – you always have the right to request a payment receipt from the seller.

Beware of phishing

Don’t open emails with links sent on behalf of the bank, and don’t give out personal information when you receive a call from someone claiming to be from the bank’s security service. You can contact them, as well as learn about all current offers in your personal cabinet of the bank’s application.

Properly dispose of documents

If you throw away documents with your personal or payment information, destroy them beforehand: tear them, cut them up, shred them, or burn them if you want and scatter them in the wind.

Don’t share your bank details in social networks

Don’t send your CVC and card details, even in an encrypted chat room. Above all, don’t send it to strange characters on Tinder who promise you a ticket to Dubai in bad English.

Don’t give out personal information about yourself

Before you share your personal information, make sure it will not be shared.

What should I do if I fall victim to fraud?

If you think you have been a victim of fraud, or you see transactions you didn’t make – contact your bank as soon as possible to block further transactions, refund your money, and investigate.

The post 7 Simple Ways to Protect Your Finances from Scammers appeared first on WebSur.

]]>