Leizl Tiangco takes a break from her wor

William, a retired teacher in Florida, U.S.A., received an e-mail he thought was from his internet service provider. The e-mail said that his billing information had been lost. William filled out the attached form and e-mailed it back. Unknown to him his personal data went to Shiva, a criminal in Queens, New York. The next day, Shiva used Williams’s credit card number to buy a photo ID printer on the internet. The e-mail William received was one of 100,000 Shiva had send out. Investigators say that about a hundred people responded and were duped. Please take the following steps and don’t be a victim…………..

1.       Make sure your computer firewall is always turned on and your operating system, applications, and antivirus software are updated regularly.

2.       Regularly back up your files, and store the copies safely.

3.       Use common sense. Do not be quick to trust information on the internet, be tactful.

4.       Do not be greedy. Beware of “free offers or web sites that sell products at extremely low prices. It could be phishing scam.

5.       Beware of unsolicited e-mails or instant messages, especially if they contain links or ask for personal information, such as verification of a password.

6.       Choose passwords that are difficult for others to guess. Change your internet password periodically, and do not use the same password for different accounts.

7.       Provide your credit card or banking information only to reputable and secure web sites.

8.       Make sure you type Web addresses accurately, especially for financial institutions. One spelling mistake might redirect you to fraudulent Wed sites.

9.       Use encrypted connections to transmit sensitive data, such as credit card details, and log off the Web site when you have finished.

10.   Review transactions on your credit card and bank statements carefully and frequently. As soon as you sport an unfamiliar transaction, contact the company immediately.

11.   Be careful when using unsecured wireless (Wi-Fi) connections, as thieves can steal information and redirect you to fraudulent Web sites.

12.   Say no to the question “Remember this password? Trojan programs can harvest your stored passwords.

SOURCE: Awake.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s