FDIC-Insured - Backed by the full faith and credit of the U.S. Government
Cybersecurity Awareness Month: How they get your data
Have you ever wondered how that telemarketing scam got your information? Scams are becoming increasingly prevalent, and it’s essential to understand how scammers operate to protect yourself. Here are just a few of the ways scammers get your information and how you can protect yourself.
Phishing: The most common scam
One of the most common methods used by scammers is phishing. This involves sending fraudulent emails or directing people to fake websites that mimic legitimate organizations. The goal is to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers.
Corporate breaches
Be careful who you give your information to. Many businesses keep terabytes of information about you, from your name and contact information, to your browsing history and common passwords. If one of these businesses experiences a security breach in their network, that information could be sold directly on the dark web. Share as little as possible with the businesses you interact with.
Public records: A treasure trove for scammers
Public records are easily accessible online and can provide scammers with valuable information. Birth dates, addresses, phone numbers, and even property records can be used to add context to a scammer’s ploy. It’s important to be aware of what information is publicly available and how scammers can use it to make themselves seem legitimate.
Social media: A digital footprint
Social media platforms have become a goldmine for scammers. By analyzing people’s profiles, scammers can gather information about their interests, relationships, and habits. This information can be used to make scams more convincing or even impersonate you and your friends.
Be vigilant and skeptical
To protect yourself from online scams, it’s crucial to be vigilant and skeptical of unsolicited requests for personal information. Never click on links or attachments in emails from unknown senders. If you’re unsure about the legitimacy of a request, contact the organization directly using a phone number or website that you know is authentic.
Ross Bentzler is Executive VP and Information Security Officer for Alpine Bank. Ross has worked in the information technology field for two decades, focusing on information security for 13 years.