Internet Crime Prevention Tips from Internet Crime Complaint Center

17 Jun
Tips: Credit Card Fraud
      1. Ensure a site is secure and reputable before providing your credit card number online.
      2. Don’t trust a site just because it claims to be secure.
      3. If purchasing merchandise, ensure it is from a reputable source.
      4. Promptly reconcile credit card statements to avoid unauthorized charges.
      5. Do your research to ensure legitimacy of the individual or company.
      6. Beware of providing credit card information when requested through unsolicited emails.

Source: IC3.gov

            1. Tips: Identity Theft
      1. Ensure websites are secure prior to submitting your credit card number.
      2. Do your homework to ensure the business or website is legitimate.
      3. Attempt to obtain a physical address, rather than a P.O. box or maildrop.
      4. Never throw away credit card or bank statements in usable form.
      5. Be aware of missed bills which could indicate your account has been taken over.
      6. Be cautious of scams requiring you to provide your personal information.
      7. Never give your credit card number over the phone unless you make the call.
      8. Monitor your credit statements monthly for any fraudulent activity.
      9. Report unauthorized transactions to your bank or credit card company as soon as possible.
      10. Review a copy of your credit report at least once a year.

Source: IC3.gov

            1. Tips: Nigerian Letter or “419″
      1. If the “opportunity” appears too good to be true, it probably is.
      2. Do not reply to emails asking for personal banking information.
      3. Be wary of individuals representing themselves as foreign government officials.
      4. Be cautious when dealing with individuals outside of your own country. Beware when asked to assist in placing large sums of money in overseas bank accounts.
      5. Do not believe the promise of large sums of money for your cooperation.
      6. Guard your account information carefully.
      7. Be cautious when additional fees are requested to further the transaction.

Source: IC3.gov

            1. Tips: Auction Fraud
      1. Before you bid, contact the seller with any questions you have.
      2. Review the seller’s feedback.
      3. Be cautious when dealing with individuals outside of your own country.
      4. Ensure you understand refund, return, and warranty policies.
      5. Determine the shipping charges before you buy.
      6. Be wary if the seller only accepts wire transfers or cash.
      7. If an escrow service is used, ensure it is legitimate.
      8. Consider insuring your item.
      9. Be cautious of unsolicited offers.

Source: IC3.gov

          1. Internet Extortion
    1. Security needs to be multi-layered so that numerous obstacles will be in the way of the intruder.
    2. Ensure security is installed at every possible entry point. Identify all machines connected to the Internet and assess the defense that’s engaged.
    3. Identify whether your servers are utilizing any ports that have been known to represent insecurities.
    4. Ensure you are utilizing the most up-to-date patches for your software.

          1. Tips: Third Party Receiver of Funds
    5. Do not agree to accept and wire payments for auctions that you did not post.
    6. Be leery if the individual states that his country makes receiving these type of funds difficult.
    7. Be cautious when the job posting claims “no experience necessary”.
    8. Be cautious when dealing with individuals outside of your own country.
          1. Phishing/Spoofing
    9. Be suspicious of any unsolicited email requesting personal information. Avoid filling out forms in email messages that ask for personal information.
    10. Always compare the link in the email to the link that you are actually directed to.
    11. Log on to the official website, instead of “linking” to it from an unsolicited email.
    12. Contact the actual business that supposedly sent the email to verify if the email is genuine.

Source: IC3.gov

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: