When it comes to online usage they say that the average computer user will choose dancing pigs over internet security every time. As technology advances, so do the ways to lure unsuspecting users into scams – our hope is to make our Integris computer users more aware of the different scams and offer some tips on how to avoid them.
One of the more frequent business scams out there is the Pretender Scam.
How does it work?
As a business owner, you most likely get mail every day, whether it’s by email or through Canada Post, it comes, sometimes in the form of payment, and almost always in the form of bills. Scammers will use this to their advantage by sending you fake invoices for work that was never completed, in hopes that an unsuspecting clerk will pay the bill without investigating whether or not it is a true invoice.
There are many different forms of scam that attempt to swindle business owners out of hard earned cash.
Here are some tips to avoid being scammed:
- Never use the contact information on a letter/invoice/correspondence suspected of being fraudulent;
- If you receive suspicious correspondence, investigate it and protect yourself from loss;
- Be cautious when giving out credit card information;
- If it seems too good to be true – it absolutely is – and high rewards always come with high risks,
- It takes a few minutes to check if you are being scammed, and it could save you hours, if not weeks, of grief;
It is always a good idea to verify content to ensure it is not a scam. The easiest way to do this – go to google, enter in the title of the article/video/post you want to read, and add the word scam. Other users will have been ‘burned’ and most likely will have posted this information. For more information on how you can protect yourself from fraud, visit the following websites:
How are we helping Integris members protect themselves? Integris Internet Security Software…
Integris has recently released Trusteer Rapport, a financial banking security software, free to Integris members, that protects your online banking communication from being stolen by criminals.
Who Is Trusteer Rapport?
Trusteer is the leading provider of cybercrime prevention solutions that protects organizations against financial fraud and data breeches. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software and real-time threat intelligence to defeat zero-day malware and phishing attacks.
What is Trusteer Rapport Security Software?
Trusteer Rapport is advanced security software that protects member online banking communication from being stolen by criminals. It is an additional layer of security to any antivirus or security software that you already have installed on your computer.
Can I use Trusteer without anti-virus software and is it a substitute for anti-virus?
Trusteer Rapport security software is available for all members and will work on your computer whether you have anti-virus software or not. However, we highly recommend having anti-virus and internet security programs installed on your computer and mobile devices.
Why is Trusteer necessary?
Anti-virus software detects only about 25% of the most popular malware. Virus creators move to quickly so that by the time anti-virus products are able to block new viruses, it is often too late. Trusteer is necessary because it detects and blocks any attempt by the malware to compromise the browser and your online banking session. It is optimized to stop financial malware and prevent financial fraud.
Do I have to pay for Trusteer Rapport Security software?
Trusteer Rapport is free for all Integris members!
How Trusteer Helps You:
- Removes existing financial malware from your computer immediately
- Prevents future malware infections
- Protects your credentials and personal information from key-logging and screen capturing attempts
- Stops phishing attacks from stealing your data and credentials
- Notifies Integris of threat activity to further drive fraud prevention
Benefits of Trusteer Rapport
- Easy to install
- Compact – it doesn’t take up much room on your hard drive
- Automatic – all updates are done in the background, so you do not have to manually perform updates
- Effective – In a recent study Trusteer Rapport stopped 100% of all financial malware testers used to try and infect a protected machine
- Proven – Trusteer Rapport was developed by the online security experts at Trusteer and currently protects over 30 million user worldwide
- Free – yes, it’s FREE! For member of Integris Trusteer Rapport has been provided at no cost.
If you have any questions about Trusteer Rapport, please contact an in-branch representative; if you need trouble shooting or support assistance please visit www.trusteer.com/support/
Tips for keeping your personal information secure:
- Never respond to unsolicited emails or text messages claiming to be from Integris that request your account information or personal details
- Use a password for your online banking that is different than what you use for accessing other online services such as email.
- Keep your computer operating system and browser up to date with the latest versions and patches.
- Do not open attachments or install free software from unknown sources. This may expose your computer and the information on it to unauthorized sources.
- Review your banking and credit card activity at least once a month to ensure there is no fraudulent activity on your accounts.
- Notify us immediately if you see suspicious activity.
Frequent Internet Scam Vocabulary
Keylogging – A keylogger is malicious software that resides unnoticed inside your computer. The keylogger records keystrokes (each time you type something on the keyboard) and then sends this information to the attacker. By grabbing your sign-in credentials and other sensitive information and sending them to the attacker, keyloggers enable the attacker to sign into your account.
Malicious Browser Add-ons – Browser add-ons (toolbars, plug-ins, etc.) control everything that happens inside your browser. A malicious add-on is capable of reading sensitive information such as your sign-in credentials and passing them to the attacker. It can also generate transactions on your behalf, such as sending money from your account to the attacker’s account.
Malicious Programs – A malicious program can connect to your browser and control everything that happens inside your browser. Such a program is capable of reading sensitive information and passing them to the attacker. It can also generate transactions on your behalf.
Screen Capturing – This malware takes screenshots and sends them to the attacker. Screenshots can include your account details, balance, and even credentials.
Session Hijacking – This malware steals your session parameters with a specific website and sends this information to the attacker. These session parameters can then be used by the attacker to take over your session with the website and to bypass the authentication process that is required to log into the website.
Phishing – A phishing attack is when the attacker builds a website that looks exactly like a website you know and trust. The attacker then convinces you to visit the website (possibly by sending you a fraudulent email). When you arrive at the fraudulent website you mistakenly believe that this is the real website. As soon as you try to sign into this fraudulent website the attacker grabs your sign-in credentials and can now use them to sign into the genuine website on your behalf.
Pharming or DNS Spoofing – A pharming or DNS (Domain Name System) spoofing attack is when the attacker causes your computer to go to a fraudulent website each time you type a real website’s address in the browser’s address bar. Once you arrive at the fraudulent website and try to sign in, the attacker grabs your sign-in credentials and can now sign in to the genuine website on your behalf.
|Written by Cori Ramsay, BA – Communications Officer|