BLOG

BLOG

Our experts here at FraudWatch International provide their top tips for avoiding scams and frauds when on Social Media and whilst using your mobile devices.

Using Social Media

Risky habits:

Today, it seems more important than ever to be constantly connected, and it’s really tempting to follow the trend of having as many followers as possible. But those behaviours come with dangers: prevent your social media profiles being hacked by connecting only with people you know in real life!

Do & Don’ts:

  • Never share your passwords with anyone, even if you think the request is legitimate, and coming from a trust-worthy friend
  • Never connect online with people you don’t know
  • Try to minimise the personal information you share online regarding your whereabouts, your role in your company, etc
  • Log out at the end of every session

Using your mobile devices

Risky habits:

It’s stating the obvious, but the loss or theft of your mobile device is an open-door into to all of your most intimate information and communications. Everything is recorded for more convenience, but think about the risks if this was to fall into bad hands. Making a purchase on your smartphone is also very risky if you were to lose it.

Do & Don’ts:

  • Always use a password on your phone, not just the 4 digits lock
  • Install mobile security software with advanced protection from trust-worthy companies (Norton, McAfee, etc)
  • Avoid accessing social networks or personal emails on your work mobile devices

Using Wi-Fi

Risky habits:

Using free Wi-Fi, no matter where you are, is more dangerous than it appears: hackers can take control of your phone or might get access to your most sensitive data.

Do & Don’ts:

  • Never use unsecure Wi-Fi to access your bank account, or shop online
  • Use public Wi-Fi as little as possible
  • If you have to use an unprotected Wi-Fi connection, use a personal VPN client*, and log off as soon as possible

*Note: a Virtual Private Network (VPN) connects two computers to the internet securely and privately across a public network. Using encryption and other security measures, a VPN client on one computer connects to a VPN server on another computer and this ensures that no one can see what information is being exchanged. Using this tool is mandatory for any sensitive transactions. Examples of trustworthy VPN clients are: Cyber Ghost VPN or VPNBook.