International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week is an annual campaign to encourage organisations and their employees to take proactive steps to prevent and detect fraud.  While fraud can be committed in many ways including in-person, it is increasingly carried out online and International Fraud Awareness week is a good time for individuals to improve their personal defences against fraud and online scams.

Particularly as we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits

While fraud can be committed in many ways including in-person, it is increasingly carried out online, often in the form of phishing scams. These scams seek to obtain personal credentials by sending fake emails to unsuspecting recipients that look like they come from trusted sources (such as banks or legitimate companies). They then use these details to access bank accounts, commit identity theft or even launch further cyberattacks. 

“Scams regularly make headlines; some inventive and sophisticated, some surprisingly simple, but unfortunately many are shrugged off - ‘I wouldn’t be fooled by that’ or ‘it only happens to older people’. In fact, a recent survey revealed that Brits under the age of 34 are twice as likely to fall victim to fraud than other age groups,” says Vonny Gamot, who is Head of EMEA at McAfee.

She continues: “It’s wise to use online protection software, a VPN to shield information on public Wi-Fi and to have strong passwords and multi-factor authentication in place. Identity protection services can also be used to monitor personal information and notify of potential misuse.” 

How to avoid becoming a victim of online fraud 

1.    Stick with known, legitimate retailers online:   Directly typing in the correct address for online stores and retailers, rather than clicking on a link, is a prime way to avoid scammers online.  

2.    Look for the lock icon in your browser when you shop:   Secure websites begin their address with “https,” not just “http.” That extra “s” stands for “secure,” which means that it uses a secure protocol for transmitting sensitive info like passwords and credit card numbers over the internet. It often appears as a little padlock icon in the address bar of your browser, so double-check for that.  

3.    Use two-factor authentication on your accounts:   Two-factor authentication is an extra layer of defence on top of your username and password. It adds in the use of a special one-time-use code to access your account, usually sent to you via email or to your phone by text or a phone call. Together, that makes it tougher for a crook to hack your account. If any of your accounts support two-factor authentication, the few extra seconds it takes to set up is more than worth the big boost in protection you’ll get.  

4.    Use a VPN if you’re shopping on public Wi-Fi:   Public Wi-Fi in coffee shops and other public locations can expose your private surfing to prying eyes because those networks are open to all. Using a virtual private network (VPN) encrypts your browsing, shopping, and other internet traffic, thus making it secure from attempts at intercepting your data on public Wi-Fi, such as your passwords and credit card numbers.  

McAfee's advice is to read up and spread the word with family and friends, as being aware of the latest scams and increasing online diligence and digital hygiene is an important step in consumer protection

Vonny Gamot is Head of EMEA at McAfee    

You Might Also Read: 

Why You Should Never Use A Free Proxy:

 

« Why Are Businesses Still Falling Victim To Ransomware?
Guilty: A Criminal Conviction For One CISO Has Consequence For Others »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.