{"id":2411,"date":"2019-10-29T17:08:47","date_gmt":"2019-10-29T22:08:47","guid":{"rendered":"https:\/\/shieldagency.com\/?p=2411"},"modified":"2025-02-08T17:20:39","modified_gmt":"2025-02-08T23:20:39","slug":"how-to-treat-these-3-cyber-tricks","status":"publish","type":"post","link":"https:\/\/www.shieldagency.com\/blog\/how-to-treat-these-3-cyber-tricks\/","title":{"rendered":"How To Treat These 3 Cyber Tricks"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.shieldagency.com\/blog\/\" target=\"_blank\" rel=\"noopener\" title=\"Shield Insurance Blog\">Shield Insurance Blog<\/a> | Cyber Tricks | <a href=\"mailto:ContactUs@ShieldAgency.com\" target=\"_blank\" rel=\"noopener\" title=\"Contact our office today!\">Contact our office today!<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It&#8217;s All A Scam! 3 Cyber Tricks<\/h2>\n\n\n\n<p>Halloween is a few short days away, and under the cover of the dark web, cybercriminals are refining&nbsp;their sinister methods. And they\u2019re only getting more sneaky and destructive.<\/p>\n\n\n\n<p>Here are three of their most common tricks and how you can avoid getting fooled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1)&nbsp; You get a dreadful call that your computer is infected<\/strong><\/h3>\n\n\n\n<p>You receive a call from someone disguised as a technician who claims your computer has a virus, and for $300 they can fix your problem by accessing your machine.<\/p>\n\n\n\n<p>You provide your payment information and login credentials, and it appears that the tech is \u201cfixing\u201d your computer. In fact, they are either doing absolutely nothing or downloading malware to transmit your personal and financial information. Scary, right?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How do you prevent this menacing scam?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Document the phone number of the caller and their name<\/li>\n\n\n\n<li>Hang up<\/li>\n\n\n\n<li>Block their number from calling again<\/li>\n\n\n\n<li>Submit your number to the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/donotcall.gov\/register\/reg.aspx\" target=\"_blank\">National Do Not Call Registry<\/a><\/li>\n\n\n\n<li>Report the matter to the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ic3.gov\/default.aspx\" target=\"_blank\">(IC3)<\/a>, which collects and follows up on this information<\/li>\n<\/ul>\n\n\n\n<p>No reputable computer security company or software firm calls to inform anyone that they have a computer virus. Normally, your firewall will prompt a message prior to accessing a bad file or site, and your anti-virus software will scan and fix your files automatically.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2) You receive a shocking email<\/strong><\/h3>\n\n\n\n<p>An email pops into your inbox with a subject line that says, \u201cYour payment of $4,890 to PayPal has been approved,\u201d or, \u201cI am NOT paying this invoice.\u201d<\/p>\n\n\n\n<p>You can\u2019t resist the urge to open it; it might seem like you\u2019re on the hook for a lot of money or being accused of something you didn\u2019t do.<\/p>\n\n\n\n<p>Emails with subject lines like these are remarkably successful in luring their victims into opening them. The real danger lies in the links. Clicking on these could open the door to malicious software,&nbsp;with ransomware&nbsp;being the usual suspect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to prevent this sinister scam of cyber tricks?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Beware of signs that an email is malicious or fraudulent<\/li>\n\n\n\n<li>Delete the email<\/li>\n\n\n\n<li>If this happens at work, alert the appropriate person or department, so other employees can be warned and protected<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3) You are tricked into transferring funds by an imposter<\/strong><\/h3>\n\n\n\n<p>A&nbsp;Business Email Compromise&nbsp;(BEC) scam usually starts off with an email that makes a pressing demand. It appears to come from an executive or trusted vendor who is unavailable to confirm the demand.<\/p>\n\n\n\n<p>The sender demands that you transfer funds immediately to facilitate a deal or to pay an invoice. The receiver may be deceived by the sender\u2019s inside information, such as details of a pending deal or specific relationship.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to prevent this nefarious scam?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Watch for emails that demand you make a funds transfer, change vendor information, or supply personal or financial information<\/li>\n\n\n\n<li>Before taking action, confirm the request verbally, either by phone call to a known number or in person<\/li>\n\n\n\n<li>Alert the appropriate internal contact so that preventive actions can be taken, such as blocking the scammers and raising co-workers\u2019 awareness<\/li>\n\n\n\n<li>Report the attempt to the IC3\u00a0on their website.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.shieldagency.com\/blog\/how-life-insurance-can-support-long-term-care-planning-without-replacing-it\/\">How Life Insurance Can Support Long-Term Care Planning Without Replacing It<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.shieldagency.com\/blog\/what-happens-if-your-vehicle-is-totaled-understanding-the-auto-insurance-claims-process\/\">What Happens If Your Vehicle Is Totaled, Understanding the Auto Insurance Claims Process<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.shieldagency.com\/blog\/why-now-is-a-smart-time-for-michigan-businesses-to-review-liability-coverage-before-spring-foot-traffic-increases\/\">Why Now Is a Smart Time for Michigan Businesses to Review Liability Coverage Before Spring Foot Traffic Increases<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.shieldagency.com\/blog\/snowstorms-and-roof-damage-is-your-michigan-home-covered\/\">Snowstorms and Roof Damage: Is Your Michigan Home Covered?<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.shieldagency.com\/blog\/do-you-need-recreational-insurance-for-your-snowmobile-in-michigan\/\">Do You Need Recreational Insurance for Your Snowmobile in Michigan?<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>3 Cyber Tricks<br \/>\nHalloween is a few short days away, and under the cover of the dark web, cybercriminals are refining\u00a0their sinister methods. And they\u2019re only getting more sneaky and destructive.<\/p>\n","protected":false},"author":2,"featured_media":14911,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[342,1,347,2],"tags":[54,1456,11,4,1408,1409,1410,1457,27,53],"class_list":["post-2411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home-insurance","category-insurance","category-rv-insurance","category-shield-blog","tag-cyber-security","tag-cyber-tricks","tag-halloween-safety","tag-home-insurance","tag-infected-computer","tag-menacing-scam","tag-scam","tag-scam-alert","tag-theft","tag-trick-or-treat"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/posts\/2411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/comments?post=2411"}],"version-history":[{"count":5,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/posts\/2411\/revisions"}],"predecessor-version":[{"id":14913,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/posts\/2411\/revisions\/14913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/media\/14911"}],"wp:attachment":[{"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/media?parent=2411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/categories?post=2411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shieldagency.com\/blog\/wp-json\/wp\/v2\/tags?post=2411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}