hamberger-btn
consumer-icon
cyber-crime-icon

How to Recognize Cyber Crime

1

Be wary of unsolicited communications

  • Beware of emails, texts, or messages from unknown senders asking you to click on a link or provide personal information.
  • Verify the legitimacy of any requests, especially those involving financial transactions or sensitive data.
2

Scrutinize website URLs and email addresses

  • Look for misspellings or slight variations in domain names that may indicate a phishing attempt.
  • Ensure the website URL starts with "https://" and has a valid SSL/TLS certificate.
3

Identify social engineering tactics

  • Be cautious of attempts to manipulate you into revealing sensitive information or performing actions against your best interests.
  • Cybercriminals may pose as trusted authorities, like your bank or a government agency, to gain your trust.
4

Monitor for signs of data breaches or identity theft

  • Regularly check your financial accounts and credit reports for any unauthorized activity.
  • Be alert to unexplained charges, new accounts opened in your name, or other suspicious changes.
5

Recognize unusual requests or urgency

  • Be wary of emails, messages, or phone calls that create a sense of urgency or pressure you to act quickly.
  • Cybercriminals often use this tactic to bypass your better judgment.
6

Validate the source of information

  • Independently verify the source of any requests for sensitive information or financial transactions.
  • Don't rely solely on the contact information provided in the communication itself
cyber-crime-icon

How to Prevent Cyber Crime

1

Use strong and unique passwords

  • Create complex, lengthy passwords that are unique for each of your accounts.
  • Consider using a password manager to generate and store secure passwords.
  • Enable two-factor or multi-factor authentication whenever possible.
2

Keep software and devices up-to- date

  • Beware of emails, texts, or messages from unknown senders asking you to click on a link or provide personal information.
  • Verify the legitimacy of any requests, especially those involving financial transactions or sensitive data.
3

Be cautious with public Wi-Fi

  • Avoid accessing sensitive information or conducting financial transactions on unsecured public Wi-Fi networks.
  • Consider using a virtual private network (VPN) to encrypt your internet traffic when using public Wi- Fi.
4

Verify the legitimacy of communications

  • Scrutinize emails, text messages, and phone calls for signs of phishing or social engineering attempts.
  • Independently verify the source of any requests for sensitive information or financial transactions.
5

Limit sharing of personal information

  • Be selective about the personal and financial details you share online or with others.
  • Be cautious of social media posts that could reveal information that could be used for identity theft or other cyber crimes.
6

Back up your data regularly

  • Regularly create backups of your important data, files, and documents.
  • Store backups in a secure location, such as an external hard drive or a cloud-based storage service.