International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week is an annual campaign to encourage organisations and their employees to take proactive steps to prevent and detect fraud.  While fraud can be committed in many ways including in-person, it is increasingly carried out online and International Fraud Awareness week is a good time for individuals to improve their personal defences against fraud and online scams.

Particularly as we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits

While fraud can be committed in many ways including in-person, it is increasingly carried out online, often in the form of phishing scams. These scams seek to obtain personal credentials by sending fake emails to unsuspecting recipients that look like they come from trusted sources (such as banks or legitimate companies). They then use these details to access bank accounts, commit identity theft or even launch further cyberattacks. 

“Scams regularly make headlines; some inventive and sophisticated, some surprisingly simple, but unfortunately many are shrugged off - ‘I wouldn’t be fooled by that’ or ‘it only happens to older people’. In fact, a recent survey revealed that Brits under the age of 34 are twice as likely to fall victim to fraud than other age groups,” says Vonny Gamot, who is Head of EMEA at McAfee.

She continues: “It’s wise to use online protection software, a VPN to shield information on public Wi-Fi and to have strong passwords and multi-factor authentication in place. Identity protection services can also be used to monitor personal information and notify of potential misuse.” 

How to avoid becoming a victim of online fraud 

1.    Stick with known, legitimate retailers online:   Directly typing in the correct address for online stores and retailers, rather than clicking on a link, is a prime way to avoid scammers online.  

2.    Look for the lock icon in your browser when you shop:   Secure websites begin their address with “https,” not just “http.” That extra “s” stands for “secure,” which means that it uses a secure protocol for transmitting sensitive info like passwords and credit card numbers over the internet. It often appears as a little padlock icon in the address bar of your browser, so double-check for that.  

3.    Use two-factor authentication on your accounts:   Two-factor authentication is an extra layer of defence on top of your username and password. It adds in the use of a special one-time-use code to access your account, usually sent to you via email or to your phone by text or a phone call. Together, that makes it tougher for a crook to hack your account. If any of your accounts support two-factor authentication, the few extra seconds it takes to set up is more than worth the big boost in protection you’ll get.  

4.    Use a VPN if you’re shopping on public Wi-Fi:   Public Wi-Fi in coffee shops and other public locations can expose your private surfing to prying eyes because those networks are open to all. Using a virtual private network (VPN) encrypts your browsing, shopping, and other internet traffic, thus making it secure from attempts at intercepting your data on public Wi-Fi, such as your passwords and credit card numbers.  

McAfee's advice is to read up and spread the word with family and friends, as being aware of the latest scams and increasing online diligence and digital hygiene is an important step in consumer protection

Vonny Gamot is Head of EMEA at McAfee    

You Might Also Read: 

Why You Should Never Use A Free Proxy:

 

« Why Are Businesses Still Falling Victim To Ransomware?
Guilty: A Criminal Conviction For One CISO Has Consequence For Others »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.