International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week is an annual campaign to encourage organisations and their employees to take proactive steps to prevent and detect fraud.  While fraud can be committed in many ways including in-person, it is increasingly carried out online and International Fraud Awareness week is a good time for individuals to improve their personal defences against fraud and online scams.

Particularly as we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits

While fraud can be committed in many ways including in-person, it is increasingly carried out online, often in the form of phishing scams. These scams seek to obtain personal credentials by sending fake emails to unsuspecting recipients that look like they come from trusted sources (such as banks or legitimate companies). They then use these details to access bank accounts, commit identity theft or even launch further cyberattacks. 

“Scams regularly make headlines; some inventive and sophisticated, some surprisingly simple, but unfortunately many are shrugged off - ‘I wouldn’t be fooled by that’ or ‘it only happens to older people’. In fact, a recent survey revealed that Brits under the age of 34 are twice as likely to fall victim to fraud than other age groups,” says Vonny Gamot, who is Head of EMEA at McAfee.

She continues: “It’s wise to use online protection software, a VPN to shield information on public Wi-Fi and to have strong passwords and multi-factor authentication in place. Identity protection services can also be used to monitor personal information and notify of potential misuse.” 

How to avoid becoming a victim of online fraud 

1.    Stick with known, legitimate retailers online:   Directly typing in the correct address for online stores and retailers, rather than clicking on a link, is a prime way to avoid scammers online.  

2.    Look for the lock icon in your browser when you shop:   Secure websites begin their address with “https,” not just “http.” That extra “s” stands for “secure,” which means that it uses a secure protocol for transmitting sensitive info like passwords and credit card numbers over the internet. It often appears as a little padlock icon in the address bar of your browser, so double-check for that.  

3.    Use two-factor authentication on your accounts:   Two-factor authentication is an extra layer of defence on top of your username and password. It adds in the use of a special one-time-use code to access your account, usually sent to you via email or to your phone by text or a phone call. Together, that makes it tougher for a crook to hack your account. If any of your accounts support two-factor authentication, the few extra seconds it takes to set up is more than worth the big boost in protection you’ll get.  

4.    Use a VPN if you’re shopping on public Wi-Fi:   Public Wi-Fi in coffee shops and other public locations can expose your private surfing to prying eyes because those networks are open to all. Using a virtual private network (VPN) encrypts your browsing, shopping, and other internet traffic, thus making it secure from attempts at intercepting your data on public Wi-Fi, such as your passwords and credit card numbers.  

McAfee's advice is to read up and spread the word with family and friends, as being aware of the latest scams and increasing online diligence and digital hygiene is an important step in consumer protection

Vonny Gamot is Head of EMEA at McAfee    

You Might Also Read: 

Why You Should Never Use A Free Proxy:

 

« Why Are Businesses Still Falling Victim To Ransomware?
Guilty: A Criminal Conviction For One CISO Has Consequence For Others »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.

SecureDApp

SecureDApp

SecureDApp is a blockchain security company that specialises in offering comprehensive security solutions to companies operating in the web3 space.