fraud protection and online safety - squarespace · pdf filephishing & imposter scams...

12
2015 EDITION FRAUD PROTECTION AND ONLINE SAFETY

Upload: dangmien

Post on 22-Feb-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

12015 EDITION

FRAUD PROTECTION AND ONLINE SAFETY

Page 2: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

2Real Possibilities is a trademark of AARP. Android is a trademark of Google, Inc. Apple is a trademark of Apple, Inc. This program is not in any way affiliated, endorsed, or sponsored by Google, Inc. or Apple, Inc.

Mobile Device SettingsTable of Contents

AARP TEK, along with the AARP Fraud Watch Network, want to help ensure that you are doing what you can to be SAFE online. This course is designed to help you identify scams and threats to your online security.

During this hands-on workshop, you'll be given tips for identifying and avoiding scams, protecting your identity, and shown how to choose and manage passwords. You will also be advised on how to set up your mobile devices and locate them if they are missing.

AARP TEK has a goal of making your online life as safe and secure as possible so that you may have a fulfilling and enjoyable online experience.

Mobile Device SettingsCreating & ManagingPasswords

Healthcare, Charity, and Lottery ScamsIdentity Theft

Phishing & Imposter Scams

Fighting Fraud

NotesAARP TEK

Securing Your iOS Device

www.aarptek.org

Page 3: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

3

Mobile Device SettingsTable of ContentsThere are risks associated with any technology. Like desktop computers, mobile devices are vulnerable to viruses and malicious software. The theft of mobile devices is on the rise across the country. Smartphones have a high resale value, and often contain personal information that can be used by identity thieves. This makes mobile devices an appealing target for robbers and identity thieves. Protecting yourself from these threats will allow you to enjoy the benefits of modern technology.

To Turn on Passcode Lock in iOSSecuring Your iOS Device

Securing Your Android Device

The first step towards protecting yourself is locking your device with a passcode, password, swipe pattern, or biometric code.

Tap the Settings App Tap Passcode Tap Turn Passcode On Tap Simple Passcode Enter a 4-digit number to be used as your code Re-enter number confirm. You're now protected!

Passcode Lock requires you to enter a 4 digit code each time you unlock your device, helping keep your information secure.

All iPhones since the model 5s include Touch ID, a sensor which allows you to unlock your phone using just your fingerprint. This is an example of a biometric code. If your iPhone has a metal circle around the home button, then it has Touch ID.

In addition to the Pattern Lock, Android phones can use a PIN (like iOS) or a password for protection.

iOS Lock Screen

Android Pattern Lock

To Turn on Pattern Lock on Android

Tap the Settings app Tap Security Tap Screen Lock Tap Pattern Draw a pattern with your fingertip Tap Continue Draw the same pattern again Tap Confirm. That's it, you secured your phone!

TEK TIP: Only download apps from the Apple App Store or Google Play Store. These apps are safe from malware. It's a good practice to read user reviews before downloading new software.

Page 4: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

4

Mobile Device SettingsYour mobile device is a powerful computer, and should be maintained just like a desktop computer. It's important to keep your software up to date, especially your device's operating system.

It's important to know how to protect your data and prevent it from falling into the wrong hands. If a thief steals your mobile device, then they could have access to the data stored on it. You can track your mobile device, and remotely delete the data off of it before any harm is done. Here's how:

Updating Your Device's Operating System Backing Up Your Information

Protecting Your Mobile Device & Data

Location Services

How to Update AndroidHow to Update iOS

Tap the Settings App Tap General Tap Software Update If there is an

update available, tap Download and Install

Tap the Settings app Tap About Phone or About Tablet Tap System Updates You will be asked if you want to install any update Tap Yes.

To Turn on Find My iPhone in iOS

To Turn on Android Device Manager

How to Locate Your iOS Device

How to Locate Your Android Device

Tap the Settings App Tap iCloud Sign in with your Apple ID Tap Find My iPhone to the on position Tap Send Last Location to the on position .

Tap the Google Settings app Tap Security Tap Remotely locate this device to on position Tap Allow remote lock and erase to on position .

If your iOS device is missing, log onto iCloud.com/find to locate it, play a sound to help find it (if nearby), lock it, prevent purchases being made from it, or erase your data.

If your Android device is missing, log onto android.com/devicemanager to locate it, ring it (if nearby), lock it, or erase your data.

Note: Connect to Wi-Fi to download the update. Note: Connect to Wi-Fi to download the update.

Note: Your device needs to be signed into your Google Account and also have location services turned on for Device Manager to work.

Page 5: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

5

Mobile Device SettingsIt's important to back up your data and device settings. This protects you from losing your data if theft or loss occur, and also helps if you damage or upgrade your device.

There are many positive reasons for allowing apps to access your location. For instance, you can get weather alerts, view directions, find nearby restaurant locations, and locate your device if it's lost. The potential downsides of using location services include unintentionally broadcasting your location through geo-tagged photos, or inadvertently allowing apps to track your location when you're not using them. Consider controlling which apps get to use your location, and when they have access to it.

Updating Your Device's Operating System Backing Up Your Information

Protecting Your Mobile Device & Data

Location Services

How to Change Location ServicesHow to Change Location Services

Tap the Settings App Tap Privacy Tap Location Services Choose

which apps can access your location and to what degree. You choose whether they Never have access, Only when using app, or Always have access.

Tap the Settings app Tap Location to toggle location services on or off Tap Recent location requests to see

individual app settings.

protect your Privacy by setting your location services

To Use Android Backup Service

Tap the Settings App Tap Backup & reset Tap Back up my data to on position . Tap Backup account to assign a Google account if you don't already have one.

To Backup Using Apple iCloud

Tap the Settings App Tap iCloud Tap Backup Tap iCloud Backup to on position .

TEK TIP: Your backup data includes calendar info, Wi-Fi passwords, email settings and more, making it easy to restore your data if you switch to a new device!

Note: iCloud Backup stores documents, photos, and settings in a large file. This requires your device to be plugged in and connected to Wi-Fi in order to backup.

Note: Location services can affect battery life. Limiting the accuracy of the service can preserve battery life.

Page 6: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

6

Creating & Managing PasswordsA password is a secret word, phrase, or string of characters used to prove identity or gain access to a resource. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. A password's strength is an estimate of how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

It can be difficult to keep track of multiple passwords. Many people choose to use a password manager. A password manager creates strong,

unique passwords for every website and app and keeps track of them for you. All of your passwords are protected by a single master password that only you know. When you visit a website, it will fill in your login information. Some examples of password managers include:

Two factor authentication (2FA) is a process that requires you to log in to an account using a back up code in addition to using your password. 2FA provides an additional layer of security. It requires both something you know (like a password) and something you have (your mobile phone). When you log in on a site with 2FA, they will often send you a code by text message that you have to enter before you can access the site.

Creating Passwords Phishing Scams

Imposter ScamsManaging Passwords

Two Factor Authentication

How to Create a Strong Password• Make your password long and strong, with a minimum of eight characters and a mix

of upper and lowercase letters, numbers and symbols. • Never share your password with others. If you suspect someone knows your

password, change it.• Make your password unique to your life and not something that is easily guessed.

Don't use the names of any family members or pets, birthdays, or single short words.• Avoid using an easy to research password that is publicly associated with you. Are

there clues to your password on your social media pages, genealogy websites or on classmates.com?

• Use memorable phrases such as: Remember2buymilk&12eggs!• You can use the first letter of words in a long phrase: R2bm&12e!• Have a different password for each online account. Consider using one good

password for all low risk accounts. Those are accounts that would have little consequence if someone else gained access (such as online news or magazines).

• Write your password down and store it in a safe place away from your computer.• Change your password several times per year. • Don't allow your browser to remember passwords to sites where you transfer

sensitive information, such as banking, medical, or shopping sites.

1Password Dashlane LastPass

PasswordManagers

are secure andeasy to

use!

Page 7: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

Creating & Managing Passwords Phishing & Imposter ScamsPhishing is attempting to acquire sensitive information such as usernames, passwords, banking information, or credit card details by masquerading as a trustworthy entity. When sent through email, scammers may attempt to replicate the look of reputable businesses. Scammers have a goal of trying to fool the email recipient to click or tap on a link, enter info on a website, or open an attachment. By clicking links, the recipient’s computer can be infected by malicious software called malware. Malware can give attackers access to the recipient's device, including their email, hard drive, and files.

An Imposter contacts you asking for personal information or money, while pretending to be somebody else. These scams can occur through email, calls, texts, social media, or online pop-ups.

Creating Passwords Phishing Scams

Imposter ScamsManaging Passwords

Two Factor Authentication

How to Create a Strong PasswordHow to Identify a Phishing Scam

Be Aware of These Common Imposter Scams

• They get your attention through alarmist messages and threats of account closures. Never click or open a link in a suspicious email or text!

Romance & Dating The imposter manipulates their intended victim into feelings of love and friendship, then asks for money. Tech Support Someone pretends to be tech support that wants to repair your computer online.Grandparent The imposter calls or emails claiming to be your grandchild or friend and in need of money.

Fake Government Agency The imposter pretends to be from a Government Agency, most commonly the IRS, and needs personal information or settlement.

Friend Request from Duplicate Friend on Facebook The imposter pretends to be one of your friends to get access to your personal information or ask you for money.

7

• They often make promises of easy money.• They entice you with deals that sound too good to be true that you have to act

fast to get.• They often capitalize on newsworthy events like natural disasters to ask for

donations.• Many of the emails use bad grammar and have poor spelling.• If you suspect an email may be fraudulent, then check the URL (web address)

of any links that it contains or call the company to verify its authenticity.• The sender's email address does not come from the entity's domain. For

example, an email from Amazon should be [email protected] not [email protected].

Page 8: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

8

Healthcare, Charity, & Lottery Scams Identity TheftHealthcare scams typically involve a criminal contacting you and saying that you need a new Medicare Card, a new Health Insurance Card, or he tries to sell you discounted Health Insurance.

Healthcare Scams

How to Avoid a Healthcare Scam

How to Avoid a Lottery Scam

How to Avoid a Charity Scam

• If you think you may be getting scammed, hang up the phone.• If you think it may not be legitimate, delete the email.• Simply ignore it. Don't engage the scammer at all.• If you think it's a Medicare scam, contact the Medicare office using the

phone number on your Medicare card to check your status.• Stay current with Medicare coverage by visiting https://www.mymedicare.gov

• Never wire money or give a credit card. • Don't share any personal information. • Ignore the request.

• Check the charity's score on Charity Navigator (http://www.charitynavigator.org)• Find out what percentage of donations go to the actual program, versus administrative

and fundraising costs.• Get detailed information about the charity, including all contact info and written descriptions of the programs that they support.• Don't be fooled by a name of a respected charity or one that sounds like a respected charity. Check their reputation by doing an online search with their exact name followed by "complaint" or "scam". • Never wire money, or send cash. Keep a record of your donations.• Never give them your social security number.• Ask for their tax-exempt letter indicating their IRS status.

In a lottery scam, someone contacts you by email, mail, or phone and tells you that you've won something. Often, they'll tell you that you need to confirm personal information or pay fees before receiving your prize. They may ask you to wire money or give them credit card information and tell you that it's urgent.

Charity scams defraud people by soliciting help with natural disaster relief, cancer, or other public health emergencies. There are many charitable organizations that were formed with the intent of creating wealth not health. If you're thinking of donating to a charity, there are several steps you should first take to assure that your generosity benefits the people you intend to help.

Lottery Scams

Charity Scams

Page 9: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

9

Healthcare, Charity, & Lottery Scams Identity TheftIdentity Theft occurs when someone uses your personal information to fraudulently obtain goods or services. This can result from imposter scams, data breaches, and theft. The Federal Trade Commission receives more complaints regarding identity theft than for any other scam.

Healthcare Scams

How to Prevent Identity Theft• Protect your information online by using strong passwords, locking your mobile

devices, and never giving out your social security number, bank account numbers, PINs, or passwords to organizations you don't know or haven't researched.

• Monitor your accounts by using Online Banking and Credit Cards apps. If something is off, you'll know when it happens and be able to act on it. A high percentage of people have never set up their online banking or credit card accounts. This is the best way to check your banking and credit card activity in real time.

• Don't use public Wi-Fi to access your banking or credit card accounts. Use only secure networks or your cellular service.

• Change your passwords often or use a password manager.• Don't post your birth year online. • Monitor your credit score at www.annualcreditreport.com

Lottery Scams

Charity Scams

Don't give your personalinformationto anyone without first confirming that they're trustworthy!

TEK TIP: You can register your phone numbers at the national Do Not Call Registry to reduce the number of unsolicited phone calls you receive. You can do so online at www.donotcall.gov or by calling 1 (888) 382-1222.

9

Page 10: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

10

Fighting Fraud AARP TEK

AARP launched the Fraud Watch Network to give people the resources to spot and avoid ID theft and fraud so they can protect themselves and their families. Non-members and members alike can get Watchdog Alerts, stay up to date on con artists latest tricks, or talk to a real person for help. Anyone interested in this information can access it free of charge.

After joining the AARP Fraud Watch Network, you'll have educational resources to guide you in learning about the latest scams, you'll get tips on how to spot them, and learn about how con artists think and work. You can also view the nationwide scam tracking map and have an opportunity to share your own experiences which will help us to fight fraud together.

How to Get Watchdog Alerts

What you can do if you've experienced fraud

Visit the AARP Fraud Watch Network on your computer or mobile device atwww.aarp.org/fraudwatchnetwork

• Click or tap on Get Watchdog Alerts • Fill out the online form • Click or tap on • That's it! Now you'll receive the latest info on new scams and con artists from AARP.

• Report it, even if it seems like a waste of time. You may help others!• Call all of your financial institutions and credit bureaus• Report to Police• Report to the FBI. You can report email scams or spam to [email protected]. Visit the

FBI's website to learn where and when to report crimes to the FBI at https://www.fbi.gov/contact-us/when• File a complaint at www.ftc.gov/complaint. This creates an identity theft affidavit which

helps you file a police report• Join the AARP Fraud Watch Network at www.aarp.org/fraudwatchnetwork• Share your story to the Fraud Watch Network Scam Map at www.aarp.org/fraudwatchmap• Contact the AARP Fraud Watch Network Helpline (877) 908-3360• Share this information with friends to help them protect themselves from fraud

You can call AARP's Fraud Watch Network Helpline at (877) 908-3360 to have a live person help you and advise you.

Page 11: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

11Visit www.aarptek.org to view our tutorial videos and learn about the upcoming workshops!

Ready to join billions of people who are connecting online using social networks like Facebook and Twitter? There are numerous social networks which allow you to keep in touch with family and friends, stay current on world news and expand your professional network. Get hands-on experience connecting with friends and businesses on Facebook and learn how to stay safe by managing your privacy settings. Before attending, sign up for a free Facebook account and bring your login information.

Intro to Facebook and other Social Networks

Learn tips and tricks that will help you UP your tech game. Explore Photo Editing and Cloud Photo Sharing, Streaming Free Music, Texting Tips, Speech-to-Text, controlling your device with your Voice, Maps and much more. Mobile device experience recommended.

Beyond the Basics: Tablets & Smartphones

If you want to ensure that you are doing what you can to be SAFE online, then this course is for you. This hands-on workshop will advise you on how to better protect yourself and your family online, tips for identifying and avoiding scams, and how to set up, back up and track your mobile devices if they go missing.

Fraud Protection and Online Safety

If you are new to mobile technology, this beginner course is for you! Join us for a hands-on workshop that can empower you with mobile device skills from Touchscreen Basics, to Texting, Taking & Sharing Photos, Downloading Apps and more.

Intro to Tablets and Smartphones

Seen one of these? It’s a QR Code! Scan them with your device using a QR reader app such as Red Laser or Barcode Scanner and you’ll be taken straight to a website.

AARP TEK

www.aarptek.org

This program is generously supported by Consumer Cellular.

Page 12: FRAUD PROTECTION AND ONLINE SAFETY - Squarespace · PDF filePhishing & Imposter Scams Fighting Fraud ... or biometric code. ... Friend Request from Duplicate Friend on Facebook

NOTES

Version 1.5 2015