Fight Against Phishing to Protect Your Reputation and Money
These thieves impersonate real businesses such as eBay or PayPal and large banks or credit card companies, and they use scare tactics in their email message asking the reader to visit their site immediately to help them recover missing information.
The link provided in the email then takes the victim to a bogus site designed to look like an official website, however, the request to reconfirm personal information such as account numbers, passwords, or social security numbers is a scam. Once the criminal has collected your personal data the real nightmare begins.
Crime never takes a vacation, and daily errors in judgment has cost countless people and small business owners in the USA time and money attempting to recover losses from stolen identity. Avoid becoming a victim if you receive any email that may be suspicious. Instead of following the website link in the email, open your browser and visit the official site and look for "support", "news", or "FAQs" to search for details.
The legitimate companies will have announcements on their sites including advice if there is a problem. If you have any doubt, email their customer support department and explain the message you received or call them by telephone.
Have you become a victim of phishing or identity theft? The US Federal Trade Commission outlines 4 steps to take if you suspect your identity and personal financial information has been compromised.
1. Contact the fraud departments of any one of the three consumer reporting companies to place a fraud alert on your credit report.
2. Close the accounts that you know or believe have been tampered with or opened fraudulently.
3. File your complaint with the FTC using their ID Theft Affidavit available at the ftc.gov website.
4. File a report with your local police or the authorities in the community where the identity theft took place. Provide law enforcement with a copy of your FTC ID Theft complaint form and get a copy of their police report or report number.
There are steps you can take to minimize your risk of being contacted by fraudulent parties. As an individual, avoid making your email address public and consider using a "throw away email address" for sites that interest you and require email contact.
The throw away address is one used for a specific purpose, and that purpose only, so any email you receive to that email box should be easier to recognize as from a legitimate source. Small business owners with websites can avoid having their email harvested by spam bots and then sold to mail lists by cloaking their address on their site. Simple code allows site owners to "display" their address when a visitor moves over a link, but the code cannot be recognized as an email address by spam bots.
Most website designers can provide this code easily. Search Google for "javascript + email cloaking" to locate free code solutions, and encourage your site designer to use this technique.
Finally, junk mail is a common problem for everyone. The last piece of advice to avoid having spammers distribute your email address is never reply to junk mail or visit a link to be removed from their mailing list. They may never contact you again, but your reply confirms the address is valid and active, and they may sell your address to another spammer.
In conclusion, all of the above activities are illegal and regulated by the FTC in the USA, and prosecuted by the Department of Justice. International scams, or moving target spammers who close under one name and reopen with another, still make this an ongoing problem. Learn the basics of protecting your personal information and react quickly to make reports if you feel you or your small business have been a victim of phishing.
Related Tags: identity theft, advice, junk mail, phishing, online fraud, fake websites
Jim Degerstrom offers small business advice based on 30 years in management, sales, and marketing, including President or General Manager of small companies in 5 states. He is proficient in website and graphic art design, and runs his online Small Business Resource Center at http://www.jimdegerstrom.com from Kissimmee FL USA.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Never Undervalue Secure Backups
The Internet can be a very intimidating place. It is full of information, and every day new busi - Lack of Internet Privacy - One Step Away from Identity Theft
Four Reasons to Use Privacy Software Unless you are a spammer, hacker, terrorist, or other such - Site Security Issues Abound
It has happened web wide and it has happened to the best of the best - NASA, DOD, Google, Micros - Online Security: How Secure are You When You Get on the Internet?
Internet technology specialists widely agree that security is becoming the primary concern of th - Software Engineering Standards Providing Industry Integrity
Software engineering is a relatively new career field in technology today in comparison to other - Protect Your E-mail by Obfuscatoin
E-mail harvesting is the process of obtaining lists of e-mail addresses from the internet. This is u - Antispyware Host File - Protect Your Computer Now With This Simple Fix
An antispyware host file is a simple defence mechanism against rogue sites that are out to get you a - What Key Features Make The Best Spyware Removal Programs?
Range Of FeaturesThe best spyware removal programs should combine multiple features so that you get - Online Job Scams and Identity Theft-What Every Job Hunter Needs to Know
There are three main types of common online job scams:1. Phony Job Offers-With this type of scam, In - Spybot Sickness - Spyware Flue
When we talk about spyware symptoms, we talk about both how you get spyware and what the symptoms of
Most viewed articles in this category:
- Parental Control Software - How Will It Help My Family?
Parental Control Software such as Safe Eyes, is a set of tools that allows parents to control what o - Designing IE Exclusive Sites Is Counterproductive And Puts Your Visitors At Risk
Excuse me for being so forthright, but designing a web site exclusively for a specific browser is do - Mind the letters and words in your password.
Radhika Venkata (c).1. Don't choose predictable passwords like asending or desending numbers or lett - Safe Password Tips for Better Computer Security
With so many online accounts to manage, most people tend to use the same password for everything. M - Minimising Credit Card Fraud - For Online Retailers
Well organized criminal organizations steal credit card numbers in many different ways (virus progra - Fraud Prevention Tips
Current areas where mail order, telephone order, and Internet fraud are most prevalent include:* Wes - Money Scams: How to Avoid Getting Ripped Off
Scams take many forms: overseas lotteries, get-rich-quick schemes, work-from-home jobs and hundreds - Protecting Your Websites From Search Engines
There are a great number of scenarios in which you should be protecting your websites from the searc - The Best Internet Privacy Software
Detect, Protect, Dis-infect, Reject, Delete, then - RepeatThe best internet privacy software isn't a - The Most Effective Spyware Removers
There are a number of things you need to look for when you are seeking the most effective spyware re