The ABC's of Cyber Scams
How cyber savvy are you?
Let’s start with some of the basics, like understanding your level of risk for identity theft and fraud. Being able to discern where/how risk can occur can significantly help you secure your personal information. Take the IDRiskIQ™ assessment to measure your risk level and get actionable guidance to help lower your chances of becoming a victim of these crimes.
Take the IDRiskIQ assessment
Can you spot the scam?
Brush up on your cyber jargon so you’re better prepared to fend off today’s cybercriminals.
Know the Scam Facts
WARNING: NO SYSTEM USED TO DETECT SCAMMERS, MALWARE OR DANGEROUS ITEMS IS ENTIRELY SUCCESSFUL OR FOOLPROOF. ACCORDINGLY, MEMBERS WHO ACCESS AND USE SCAMASSIST DO SO ENTIRELY AT THE MEMBERS’ OWN RISK. Iris’ SCAMASSIST SERVICES ARE PROVIDED TO MEMBERS ON AN “AS IS” AND “AS AVAILABLE” BASIS. WITHOUT LIMITING THE FOREGOING, Iris AND ITS AFFILIATES, AGENTS, PARTNERS, AND SUBSIDIARIES DISCLAIM TO THE MAXIMUM EXTENT ALLOWED BY LAW ANY WARRANTIES, EXPRESS OR IMPLIED, OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT IN CONNECTION WITH SCAMASSIST.
By asking us to evaluate a contact, offer or solicitation through ScamAssist, you agree: 1) that ScamAssist helps to determine whether an offer or solicitation is legitimate or poses an apparent threat, but it may not necessarily detect all threats; 2) that Iris is not responsible or liable for the availability, accuracy, or effectiveness of the techniques, products, tools, or resources used by Iris in its ScamAssist service; 3) that any references or links to websites or resources that Iris may send to you in response to your case do not imply any endorsement by Iris of the content, products, or services of such websites or resources; 4) that by using ScamAssist, you understand that Iris cannot and does not guarantee the safety of items checked using ScamAssist; and 5) that you assume all responsibility and risk arising from using, “clicking on," responding to, or otherwise engaging with any offer or solicitation that you may receive.
1. Take the quiz
Test your knowledge!
2. Share the quiz on social media
3. Retake the quiz to improve your knowledge
4. Become a scam-spotting pro!
click to explore
Is it okay to click any hyperlink I see on the internet or that’s been emailed/texted to me?
Can I recycle passwords or use the same password for my banking app and streaming subscriptions?
Other than secure passwords, what can I do to better protect my online accounts?
How often should I check my bank statements and/or credit profiles?
What should I do if I get a text message or email from someone I don’t know who's demanding payment or an action?
Is there more I can do to protect my identity and finances from identity thieves?
6 Tips to Avoid Almost Any Scam
Read our #BeCyberSmart blogs for tips to help protect you from becoming a victim of cyber scams and fraud.
ScamAssist : A Resource to Reduce Your Risk
Not sure about a link in the promotional email you received yesterday? What about that too-good-to-be-true offer someone named Dwight texted you? Well, Iris Identity & Cyber Protection is here to help!
Acceptable Solicitation Types
Email
Websites or web links/URLs
Flyers or postal mailings
Phone calls or voicemails
Text messages
Simply call us at 866.311.1488 with the solicitation using promo code Fraud Week 2021 (acceptable solicitation types listed below).
Our ScamAssist Specialists will then provide you with guidance on the probable legitimacy of the solicitation. Within two (2) business days of receipt of messages, our Resolution Specialists will:
Scrutinize message(s) you’ve received for signs of fraud
Conduct research on any organizations a solicitation claims to be from
Compare offers to other known scams and phishing attempts
Provide a written assessment of what we believe is the level of legitimacy of the received message
Social Engineering
Spyware
Keylogging
Ransomware
Crypto-jacking
Virus
Trojan Horse
Brand-jacking
Botnet
1 in 5
Lost money to imposter scams in 2020
Imposter scam victims in 2020
39 million
40%
of parents concerned about someone using coronavirus-related scams to steal personal information.
8.5
Average hours consumer spent resolving a case in 2020
No – it can be risky! Don’t click on any hyperlinks or internet sources you don’t know or aren’t familiar with. The links could re-direct you to a phishing website intending to steal your personal information or a website containing malware.
People do, BUT you really shouldn’t. In fact, if you are – change one now!
Always use strong, long, and unique passwords for all your accounts and subscriptions, and don’t reuse old passwords. If one of your account’s passwords is compromised in a data breach, hackers will try their hardest to access your other accounts with that password as well.
Great question! It’s recommended that you set up two-factor authentication where available for an extra layer of security. Also, install data protection, including anti-virus, anti-ransomware, anti-keylogging, and anti-phishing software on all internet-connected devices for even more peace of mind as you’re browsing the world wide web.
Just like we brush our teeth every day, we should make monitoring our credit profiles a regular habit. Whether it be weekly, bi-weekly, or monthly, it’s best to routinely check your credit profiles and bank statements to ensure suspicious activity isn’t occurring and someone else isn’t fraudulently using your financial information.
Never respond (or forward!) unsolicited emails, text messages, or social media messages from unknown or unfamiliar senders. Simply delete the message. Also, if someone unfamiliar to you is demanding payment – particularly in the form of gift cards or wire payment – run. This is a scam as identity thieves want you to be so afraid that you quickly hand over your personal information or hard-earned money.
Yes! If you haven’t already, sign up for a comprehensive identity protection service that includes credit and identity monitoring.
Buyer beware: not all identity protection services will protect you equally, so make sure you find a service with powerful monitoring capabilities and 24/7/365 full-service resolution assistance should you ever find yourself the victim of fraud. Contact us today to learn if your trusted insurance provider, employer, financial institution, or cybersecurity provider offers Iris On Watch.
Malware
Social Engineering
The psychological manipulation of people into performing specific actions or divulging personal information.
Spyware
Software that gathers personal data (i.e., credit card numbers or account credentials) unknowingly from a victim,
then forwards
it to a third party.
Malware
Software that is intended to damage or disable computers and systems.
Keylogging
When a malicious computer program records a user's
keystrokes
unknowingly (usually to steal passwords or credit card numbers).
Ransomware
Malware that blocks access to important and/or sensitive data,
whereby the
victim is forced
to pay a ransom
to get it back.
Cryptojacking
The secret use of your computing device to mine cryptocurrency.
Virus
Harmful “software” that attaches itself to active host programs
and replicates itself
so that the
computer is unable
to function normally.
Trojan Horse
A malicious computer program that appears harmless and is willingly installed on victims’ computers –
usually by a social engineering technique.
Brandjacking
Taking over the online identity of another person, business, or brand (usually formalicious purposes).
Botnet
A network of internet-connected devices infected with malware and controlled as a
group without
the owner’s
knowledge.
Click to play!
3 Ways to Help You & Your Community #BeCyberSmart
Phishing? Ransomware? Social engineering?
Today’s digital dangers affect almost every individual across the globe; and yet, for most, putting a name to these threats can often prove challenging.
It’s no secret that knowledge is power, and the best way to protect yourself and your customers starts with education.
After you’ve knocked the assessment out of the way, scroll down to test your scam-spotting skills. Once you’re finished, share the quiz on social media with your friends and family. And be sure to check out the rest of the educational resources we’ve compiled for you, like shareable social graphics, scam facts, and much more.
Cybersecurity is a shared responsibility. Let’s all do our part be cyber smart this #FraudWeek and beyond.
Check back each week for a new blog post!
Read blog
76%
need the help of a trained expert to feel truly protected from identity thieves and cybercriminals
1.
2.
3.
4.
Federal Trade Commission, Consumer Sentinel Data Book 2020
Javelin Strategy & Research, 2021 Identity Fraud Study
Javelin Strategy & Research, Iris powered by Generali,
Fraud-Prevention Education: A Positive Customer Experience, 2021
Generali Global Assistance, ID Theft & Cyber Crime Research, Benenson Strategy Group, 2020
Generali Global Assistance, ID Theft & Cyber Crime Research, Benenson Strategy Group, 2020
Help protect your friends & family by sharing these graphics on social media!
Click arrows to scroll
During #FraudWeek, November 14-20, you can take advantage of our ScamAssist research service. Let our expert ScamAssist Specialists give you a case-by-case assessment on the likelihood of a solicitation being a scam – and lower your risk of inadvertently providing funds or sensitive information to a con artist.
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share
A Cyber Hygiene Tip a Day to Keep the Hackers Away
Read blog
Test Your Knowledge! Can You Spot the Scam?
Read blog
Video:
The People Who Make Us #PeopleFirst
Read blog
Identity Theft
(and Cybersecurity)
is Not A Joke, Jim!
Read blog
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share
Click the image to download and share