Main Content
black computer keyboard
Q3 2020 Fraud Newsletter

phone with card, money, and identity coming out under a lock symbolBest Practices

Use Common Sense

As obvious as this may sound, never take your eyes off your belongings or allow a stranger to watch them for you. Electronics are popular targets for thieves. Our computers and mobile devices contain massive amounts of highly sensitive information that, if lost or stolen, could lead to data breaches or identity theft. Additionally, use strong passcodes to protect your device.


Use Caution with Public WiFi

If possible, be cautious when using public WiFi. But if you must, make sure you use a secure WiFi connection. This helps prevent cybercriminals from intercepting your internet traffic and stealing data. It is still best to avoid accessing confidential data until you are on a secure, private network.


Don’t Trust USBs

When you need to charge your devices, only use the power supplies you own. Public USB charging stations can be compromised and used to infect devices with malware. You should also never plug in a USB charging cable or flash drive that doesn’t belong to you.


Privacy Takes Precedence Over Productivity

It’s best to wait until you have privacy before accessing or discussing anything that could be deemed confidential. Should you need to work in a public space, use discretion. Make sure no one can peek over your shoulder to see your screen, and lower your voice when using the phone.


Plan Ahead

If there are apps or documents you know you’ll need while traveling, download them before leaving. And even though theft or loss of a device is troublesome, you can mitigate the negative consequences by enabling “find my device”—a built-in feature on most modern smartphones that allows you to locate your device from a secondary device, ping the lost device to ring, or completely wipe it and restore to factory default.


Mobile Threats and How to Avoid:

text bubble with alert symbol within



Never click on links in, or respond to, text messages from unknown senders, especially those that use threatening or urgent language, such as claiming that a bank account has been compromised.

found loading an app with an alert symbol overlaid


Malicious Apps

Scammers create malicious apps – often impersonating legitimate apps – to invade privacy. Before downloading and installing any software, research the developers, and only download from verified sources.

view more link with cursor clicking on it and alert sign hanging above it


Malware and Viruses

Malicious apps and small screens – combined with the click-happy nature of humans – increase the likelihood of malware and other infections. Don’t let your device get sick! Install antivirus and antimalware software, and click (or tap) with extreme caution.