Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
Verify the caller's identity before sharing personal information. If suspicious, hang up and call back using a trusted number. Beware of pressure tactics or urgent requests. Trust your instincts to protect yourself from vishing scams.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 9, 2024 16:37 (on 10/9/24) | 0 | QR Ready | 1 minute read
Are you an active social media user? While sharing life moments can be fun, be aware of the risks, especially regarding work-related information.
To protect yourself from hackers:
- Be cautious about what you share; avoid sensitive job details.
- Limit job-related posts.
- Review your privacy settings to safeguard your organization.
By thinking carefully about your online posts, you can protect your job and reputation.
October 8, 2024 18:34 (on 10/9/24) | 0 | QR Ready | 1 minute read
Always scrutinize the sources of information shared online to prevent spreading misinformation that could harm your organization. Verify facts and check credibility before sharing to maintain integrity and trust.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 8, 2024 16:26 (on 10/8/24) | 0 | QR Ready | 1 minute read
Verify identities before discussing sensitive information, even with colleagues. Keep documents secure and out of sight. Avoid leaving sensitive information unattended in public spaces. By assuming potential threats, you can reduce the risk of data breaches.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 7, 2024 18:45 (on 10/8/24) | 0 | QR Ready | 1 minute read
Be cautious with online quizzes and surveys that request personal information. Sharing details like your name, email, or even more sensitive data can lead to identity theft or unwanted spam. Always prioritize your privacy and think before you share.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 6, 2024 16:53 (on 10/6/24) | 0 | QR Ready | 1 minute read
Regularly review your account activity logs for any unusual access patterns or unauthorized login attempts. This practice helps you catch potential security breaches early and protects your information from unauthorized access
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 3, 2024 18:15 (on 10/4/24) | 0 | QR Ready | 1 minute read
A large fraud scheme has been uncovered, involving fake trading apps on the Apple App Store and Google Play Store, along with phishing websites. This was reported by Group-IB.
This scam is part of a consumer investment fraud scheme known as "pig butchering." In this scheme, scammers trick people into investing in cryptocurrency or other financial products after gaining their trust, often pretending to be romantic partners or investment advisors.
These deceptive tactics usually lead to victims losing their money. In some cases, the scammers even ask for more money through various fees and payments.
Group-IB, a company based in Singapore, noted that this scam has affected people worldwide, with victims in Asia-Pacific, Europe, the Middle East, and Africa. The fake apps, made with a tool called UniApp Framework, are referred to as UniShadowTrade.
Source: Fake Trading Apps Target...
October 2, 2024 16:39 (on 10/2/24) | 0 |
1 minute read
Set your devices to automatically lock after a short period of inactivity. This step prevents unauthorized access and helps protect your data from prying eyes. Whether stepping away for a moment or leaving your device unattended, an auto-lock feature serves as a crucial line of defense.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 2, 2024 16:31 (on 10/2/24) | 0 | QR Ready | 1 minute read
Phishing is a scam where attackers impersonate trustworthy entities to steal sensitive information.
Do's:
- Hover over links to check their destination; verify the sender's email for errors or odd domains.
- Evaluate the email's urgency; beware of fear tactics.
- Be cautious with requests for personal info, like login or financial details.
- Look for grammar mistakes and generic greetings.
- Confirm that linked websites match official domains.
Stay alert and protect yourself from online fraud!
October 1, 2024 16:34 (on 10/1/24) | 0 | QR Ready | 1 minute read
Always verify email signatures to confirm the identity of the sender, especially when dealing with financial or sensitive requests. This extra step helps protect you from phishing and ensures that your information remains secure.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 1, 2024 16:34 (on 10/1/24) | 0 | QR Ready | 1 minute read