Online Scams. Ready to get started? Click on the green button to continue.

Similar documents
Introduction to

Spam Protection Guide

Your security on click Jobs

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

South Central Power Stop Scams

Newcomer Finances Toolkit. Fraud. Worksheets

Staying Safe on the Internet. Mark Schulman

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

PROTECTING YOUR BUSINESS ASSETS

Safety and Security. April 2015

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Some jobs are listed in local classified ads, like the ones found in the newspaper.

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.

How to recognize phishing s

Phishing: What is it?

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

TIPS TO AVOID PHISHING SCAMS

FAQ. Usually appear to be sent from official address

WEB OF DECEIT. Why are seniors targeted?

INTERNET SAFETY IS IMPORTANT

Creating and Using an Account

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Paid-for antivirus software

Train employees to avoid inadvertent cyber security breaches

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

How to Build a Culture of Security

Online Security and Safety Protect Your Computer - and Yourself!

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

SPAM UNDERSTANDING & AVOIDING

It pays to stop and think

3.5 SECURITY. How can you reduce the risk of getting a virus?

INTERNET SECURITY STAYING SAFE ONLINE

EDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP

Introduction to

Cyber Security Guide for NHSmail

Who We Are! Natalie Timpone

Top 5 Tips To Take A Stand Against Telephone Scams

Financial scams. What to look for and how to avoid them.

to Stay Out of the Spam Folder

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

FAQ: Privacy, Security, and Data Protection at Libraries

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

Organising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-

The Dilemma: Junk, Spam, or Phishing? How to Classify Unwanted s and Respond Accordingly

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Contents. Management. Client. Choosing One 1/20/17

ATTACHMENTS, INSERTS, AND LINKS...

Target Breach Overview

"Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018

CAREERBUILDER.COM - PRIVACY POLICY

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

How to Stay Compliant with SMS Marketing

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

SiteAdvisor Enterprise

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

ELECTRONIC BANKING & ONLINE AUTHENTICATION

PRACTICING SAFE COMPUTING AT HOME

Security Awareness. Presented by OSU Institute of Technology

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Protecting Your Business From Hackers

Day 5- there is quite a bit of prep for days 5 and 7 Objectives Learners will be able to. Materials Computer skill: Literacy skills:

EADS up. stop think connect

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Security Practices & File Encryption

Using WebQuarantine for Managing Quarantined Messages

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Computer Basics 4 Basics Revision 3 ( )

Credit Card Frauds Sept.08, 2016

Communication using

Security and Privacy

INFORMATION ABOUT SCAMS FOR RESIDENTS

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

McAfee S DO s AnD DOn ts Of Online Shopping

Table of content. Authentication Domain Subscribers Content Sending practices Conclusion...

Client Resources. participant guide

Malicious s. How to Identify Them and How to Protect Yourself

Retail/Consumer Client Internet Banking Awareness and Education Program

Why isn t your chapter on Facebook?

Accounts and Passwords

The 12 scams of Christmas

Your message is sent from your computer to a server (like the post office) where the

Why was an extra step of choosing a Security Image added to the sign-in process?

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Real Fast PC. Real Fast PC Win 7.

Etiquette FOR A BUSY WORLD. Brevity can be off-putting. Always reply

But it Was Such a Little Phish February 2016 Webinar

INTERNET BASICS. GETTING STARTED PAGE 02 Prerequisites What You Will Learn

GRANDPARENT S GUIDE TO TECHNOLOGY VOLUME 2

IMPORTANT SECURITY INFORMATION PHISHING

How to Open a Free Yahoo! Account & Basics

Computer Foundation Skills. Internet Webmail

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

Create strong passwords

Do not open attachments on s that you are not sure of.

Transcription:

Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs, how to respond when you see a scam, and how to report a scam. Ready to get started? Click on the green button to continue. 1

Online scams can come in many shapes and forms. You may encounter them on a website, in an email message, including a type of scam called phishing, or in a pop up window. Let s look at some examples. Click on each button to learn more. 2

Website Scams Many websites are not trustworthy. They may try to infect your computer with a virus or lure you into giving them money or personal information. Others may simply try to convince you to click on ads, or give information that is not accurate. 3

Spam Emails Junk email, or spam, is almost always fraudulent. These emails are sent to thousands of people at the same time. They try to lure people into clicking on links in the messages, calling a fake number, or even transferring money to the sender. 4

Phishing Phishing is a common type of scam. This is when a website or email claims to be a real organization, like the IRS or a bank. Scammers pretend to be an organization that you ve heard of to win your trust. Then they ask you for your personal information, or try to get you to visit a fraudulent website. 5

Pop-Up Windows Some websites will open pop-up advertisements that are hard to close. This is a sure sign that the website is not to be trusted. Great! Now that you ve learned about these four types of scams, click the green button to continue. 6

No matter what form a scam takes, scams usually have the same goals: to steal your money or collect information like your passwords or credit card numbers. Scams can also cause problems for your computer by infecting it with viruses or malware. 7

Why do people send spam emails? 1. They want to collect passwords and credit card numbers. 2. They want to sell your information to make money? 3. They want you to visit a website or download a file. 4. They want you to transfer them money. 5. All of the above. The correct answer is All of the Above. That s right! It s important to guard against scams to keep your information safe. 8

Recognizing Scams How can you tell if something is a scam? Here are some questions to ask yourself if you re not sure. We ll look at them one by one. Click each question in the list to learn more. 9

Have you heard of the person or organization before? If not, do some research before responding. If it s a legitimate business, their official logo, address, and contact information should be posted on their website. 10

On an email message, can you tell who it is from? Look at the address to see if it makes sense. This one claims to be from the IRS, but the email address ends with yahoo.com instead of irs.gov. This is a sure sign of a phishing scam. 11

Does the email look professional? If it s a company that you have an account with, they normally include your name. This one just says Cardholder. If it s from a business, there shouldn t be any spelling or grammar mistakes like this one. 12

Are they asking for your information? Scammers may claim that they need to verify or update your information. Some scammers will also ask you to wire them money or send a deposit, promising to pay you more in return. 13

Do they claim that they can fix your computer? Some pop-up scams will say that your computer is infected and tell you to call a number so that they can fix it. Legitimate computer companies like Microsoft will never solicit you to fix your computer in this way. 14

Are they trying to rush you into a quick action before taking the time to think about it? Some scammers try to scare you into acting fast, threatening that something bad will happen, like an account will be closed. Other scammers will promise something good, but only if you respond right away. 15

Is it too good to be true, like winning the prize for a contest that you don t remember entering? If it sounds too good to be true, it probably is. 16

Take a look at this example. How can you tell that it s a scam? 1. Sent from a strange email 2. Tries to rush you into an action 3. Asks for your information 4. Too good to be true 5. All of the Above The correct answer is All of the Above. That s right! This email shows several signs of being a scam. We ll learn what to do with emails like this one in the next lesson. 17

What to Do with Scams Let s look at the best course of actions to take when you encounter a scam. Here are some do s and don ts. Use the green buttons to view each of the tips in this list. 18

Don t give out personal information to something that could be a scam. This includes name, email address, credit card number, or password. 19

Don t reply or engage them. This can notify the scammer that they ve reached a real person, which can result in more scam emails. 20

Don t click on any links in a scam email. This can take you to dangerous websites. 21

Don t download any email attachments or files on an untrustworthy website. They could contain viruses or malware that harm your computer, or collect your personal information. 22

Do put the email message in your spam folder. This will help your email provider alert other people that this is a scam. 23

If you suspect something is a phishing scam imitating a real company you trust, don t contact using the email or phone number they gave you. 24

Do look up their contact information on your own, from a statement you ve received in the mail or from their official website. 25

For pop-ups on a website, don t click on any buttons. Sometimes even the X will not close a scam pop up window, and may trigger more pop-ups to open instead. 26

Do try using another method to close the pop up window. One way to close it is to hold down the Alt key while you press F4. This will close the window. If all else fails, restart your computer, or turn it off and back on again. This is better than being stuck inside a scam. 27

See if you can help Kevin address this scam. What is the best course of action? 1. Click Unsubscribe to stop getting Spam in the future 2. Reply and tell the sender to stop emailing him 3. Put it in his Spam Folder or ignore it 4. Click the link to visit the website and see if it s trustworthy The correct answer is Put it in his Spam folder or ignore it. Good job. Follow these tips to stay safe whenever you 28

Reporting a Scam Online scams can originate from anywhere in the world. This makes it very difficult or even impossible to track down who is really behind them. However, there are a few actions you can take to help protect others from falling for the same scam. 29

If you encounter a phishing scam imitating an organization you know, you can contact that organization. But remember not to use the contact information in the email. Look up their information from a different source. Then, they can warn their other customers about it. For example, if you see an email imitating the IRS, you can forward it to phishing@irs.gov. 30

If you receive an email scam, put the message in your spam or junk folder. This helps email providers like Gmail and Yahoo warn others who receive the same email. 31

You can also file official complaints with the Federal Trade Commission by visiting their website at ftc.gov/complaint. Remember the warning signs you ve learned in this course in order to protect yourself from scams any time that you browse the web or use email. 32