Train employees to keep company data safe
posted by Stephan Thomasee on Wednesday, December 11, 2019 in SHAZAM Blog
While online shopping is probably discouraged in your workplace, there’s a good chance employees are using their company computer or smartphone to buy gifts and holiday supplies. Their actions put your institution at risk. Train employees to be alert and watch for scams that can compromise security.
Share these tips for a safer holiday shopping season
- When shopping online, confirm the site is secure. To ensure the safest shopping experience online, be sure the link starts with, “https.” The “s” stands for secure. Also look for a padlock, which is usually found in the bar at the top of the screen next to the web address.
- Use your mouse to hover over web addresses. Make sure the link directs to a legitimate website. Look for typos, repeated letters and other misspellings that can indicate a spoofed site. When in doubt, type the web address into the search bar.
- Pay close attention to the sender's email address. The domain name should match the retailer's legitimate website. A spoofed email address may look legitimate. Hover over the address to check for characters in the address that look correct but are different. For instance, a W may be represented with two Vs, as in Kvvill@company.com, instead of Kwill@company.com.
- Don’t inadvertently give your credentials to fraudsters by logging in to view a coupon or special deal. Legitimate retailers won’t ask for this information.
- Avoid shopping on public Wi-Fi. Fraudsters can connect to the Wi-Fi service and capture your account numbers and passwords. Buying items, checking your bank account and paying bills can be a risky business on public Wi-Fi.
Protect yourself and your financial institution
Social engineering attempts can be convincing and confusing. Train your staff and educate your accountholders so they don’t fall victim to these scams.
All working together, we can fight fraud due to social engineering, and ultimately reduce data breaches and compromises.
About the Author
Stephan Thomasee utilizes his technical background, proven business acumen and operational leadership capabilities to create value for internal and external customers. He utilizes IT to drive business growth by advancing security, enhancing performance, ensuring availability and refining function
... read entire bio
SHAZAM, Inc. and ITS, Inc. provide this blog for general informational purposes only. Our blog may be shared by a direct link wherein the content remains as originally presented and has not been altered. SHAZAM, Inc. and ITS, Inc. assume no responsibility for errors or omissions in the contents on the blog. By using this blog, reader agrees that the information published does not constitute nor is a substitute for legal advice which should only be sought from a qualified, licensed attorney.
comments powered by