Home
>
Resources
>
Security Resources
>
Online Security Tips

Online Security Tips

Controlling your privacy and security settings is essential for safeguarding your online presence.

  1. Do you have your computer's settings adjusted to automatically update software and security enhancements?
  2. Have you ever typed your name into a search engine to discover what personal information is accessible online?
  3. Have you customized your security and personal information settings on social media platforms?

Online threats have evolved beyond technical issues like viruses and malware on your computer. Today, they have become more social, including phishing ads tailored to your online searches, stolen passwords, identity theft, and cyberbullying.Simple actions like monitoring your privacy settings and limiting the personal information you share online can empower you to maintain control over your digital identity.

What To Do

+

Know who you’re dealing with.

Try to find a seller’s physical address (not just a P.O. Box) and phone number. With internet phone services and other web-based technologies, it’s tough to tell where someone is calling from. Do an internet search for the company name and website, and look for negative reviews. If you find them, you’ll have to decide if the offer is worth the risk. After all, it’s only a good deal if you actually get a product that works.

Understand that wiring money is like sending cash.

Con artists often insist that people wire money, especially overseas, because it’s nearly impossible to reverse the transaction or trace the money. Don’t wire money to strangers, to sellers who insist on wire transfers for payment, or to anyone who claims to be a relative or family friend in an emergency who wants to keep the request a secret.

Regularly log into your online accounts.

Don’t leave it for as long as a month before you check each account. 

Read your bank, credit, and debit card statements to ensure that all transactions are legitimate.

Scammers steal account information and then run up charges or commit crimes in your name. If anything looks suspicious or you don’t recognize the transaction, contact your bank and/or card issuers.

Give only to established charities after a disaster.

In the aftermath of a disaster, give to established charities, rather than one that has sprung up overnight. Pop-up charities probably don’t have the infrastructure to get help to the affected areas or people, and they could be collecting the money to finance illegal activity. For more donating tips, check out www.ftc.gov/charityfraud.

When investing, remember there’s no sure thing.

If someone contacts you with low-risk, high-return investment opportunities, stay away. When you hear pitches that insist you act now, that guarantee big profits, that promise little or no financial risk, or that demand that you send cash immediately, report them at www.ftc.gov.

What Not To Do

+

Don’t send money to someone you don’t know.

Not an online seller you’ve never heard of — nor an online love interest who asks for money. It’s best to do business with sites you know and trust. If you buy items through an online auction, consider using an option that provides protection, like a credit card.

Never pay fees now for the promise of a big pay-off later — whether it’s for a loan, a job, or a so-called prize. 

Don’t agree to deposit a check and wire money back.

Despite the believability of a story, banks are legally obligated to make deposited check funds available within a matter of days. However, identifying a counterfeit check can take significantly longer. The responsibility for the checks deposited lies with the depositor. In the event of a fraudulent check, the depositor is liable for reimbursing the bank.

Don’t reply to messages asking for personal or financial information.

Regardless of the communication channel—email, phone call, text message, or advertising—refrain from clicking links or calling phone numbers included in the message. This deceptive practice known as phishing aims to manipulate you into divulging sensitive information. If you receive a suspicious message and are concerned about your account status, contact the number provided on your credit or debit card or your statement for verification.

Don’t play a foreign lottery.

Playing foreign lotteries is illegal, even though messages promoting your chances of winning or claiming you've already won can be enticing. These messages often request "taxes," "fees," or "customs duties" to release your prize. However, sending money to claim your winnings won't result in any winnings. Instead, you'll lose the money you sent. Despite any promises made, you won't be reimbursed.

Report Online Scams

+

If you think you may have been scammed:

  • File a complaint with the Federal Trade Commission. You may visit their website at ftc.gov for more information or call 1(877) FTC-HELP (1.877.382.4357). The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
  • Visit ftc.gov/idtheft, where you’ll find out how to minimize your risk of identity theft.
  • Report scams to your state Attorney General by visiting their website. In Oklahoma, it is at oag.state.ok.us/ or by calling 1.405.521.3921.
  • If you get what looks like lottery material from a foreign country through the postal mail, give it to your local postmaster.

Use Security Software That Updates Automatically

+

To safeguard your computer against the latest threats posed by ever-evolving cybercriminals, it's crucial to keep your security software up to date. Many security software programs offer automatic updates; enable this feature to ensure continuous protection. Several reputable companies provide free security software. Additionally, configure your operating system and web browser to receive automatic updates.

Neglecting updates for your operating system, web browser, or security software can open the door for criminals to infiltrate your computer with malware. This malware can be used to surreptitiously access other computers, distribute spam, or monitor your online activities. Fortunately, there are steps you can take to detect and remove malware.

Beware of unexpected pop-up messages or emails claiming to have scanned your computer and detected malware. These messages are often sent by scammers to deceive you into purchasing useless software or, even worse, allowing them to compromise your computer's security.

Treat Your Personal Information Like Cash

+

Be cautious with your personal information! Your social security number, credit card numbers, and bank and utility account numbers are valuable tools for scammers. They can use these to steal your money or open new accounts in your name. Before you provide your personal information, whether through a web form, email, text, or phone call, carefully consider if you can trust the request. Keep in mind that scammers will go to great lengths to appear trustworthy in their attempts to steal your information.

Check Out Companies To Find Out Who You Are Really Dealing With

+

Before making online purchases, it's essential to conduct thorough research to save money and avoid potential scams. If an advertisement or offer catches your attention, take a moment to investigate the company behind it. Utilize your preferred search engine to search for reviews, complaints, or scam reports associated with the company or product name. If you encounter numerous negative reviews, assess whether the offer is worth the potential risks. Additionally, if you're unable to locate contact information for the company, consider doing business elsewhere.

Remember, just because an advertisement appears on a reputable website doesn't automatically make it trustworthy. The presence of an ad on a website doesn't necessarily indicate an endorsement or even familiarity with the advertised site. Stay vigilant and conduct your own research to make informed decisions when shopping online.

Give Personal Information Over Encrypted Websites Only

+

When conducting online transactions, such as shopping or banking, prioritize using websites that employ encryption to safeguard your sensitive information during transmission from your computer to their server. To verify encryption, look for "https" at the beginning of the web address, where "s" stands for secure.

Develop the habit of manually entering the website address for any financial transactions, including banking, shopping, auctions, or other monetary exchanges. Avoid relying on links provided in emails or on other websites.

Pay attention to the "locked padlock" icon in the browser frame, typically near the address bar. Double-click it to display the security certificate for the website. If the displayed certificate does not match the website's address, refrain from proceeding.

Heed alerts and warnings issued by your browser. For instance, if it identifies a website as a known phishing site, discontinue your visit and refrain from entering personal information.

Protect Your Passwords

+

Here are a few principles for creating strong passwords and keeping them safe:

  • The longer the password, the tougher it is to crack.
  • Mix letters, numbers, and special characters. Try to be unpredictable — don’t use your name, birth date, or common words.
  • Don’t use the same password for many accounts. If it’s stolen from you — or from one of the companies with which you do business — it can be used to take over all your accounts.
  • Don’t share passwords. Legitimate companies will not send you messages asking for your password. If you get such a message, it’s probably a scam.
  • Keep your passwords in a secure place, out of plain sight.
  • Change passwords at regular intervals for all online sites, such as online banking, merchant sites, and email accounts.
  • Always log off the website after you have submitted an application or concluded a secure online session.

Backup Your Files

+

For optimal data protection, consider creating backups of essential files. Transfer these files onto a portable storage device like a removable disc, USB flash drive, or external hard drive. By storing these backups in a secure location, you ensure that even if your computer is compromised or damaged, you will still have access to your crucial information.

Understand How A Wireless Network Works

+
  1. Wireless Connectivity:
    • Establishing a wireless network involves connecting an internet access point (such as a cable or DSL modem) to a wireless router.
    • The router transmits a signal through the air, covering a range of up to several hundred feet.
    • Any computer within this range equipped with a wireless card can receive the signal and access the internet.
  2. Security Concerns:
    • Without proper precautions, anyone nearby with a wireless-enabled computer or mobile device can access your network.
    • This means neighbors or hackers could piggyback on your network, potentially accessing information on your computer.
    • Unauthorized network use, such as committing crimes or sending spam, could be traced back to your account.
  3. Encryption Activation:
    • Many wireless routers come with encryption features disabled by default.
    • It's crucial to enable encryption to protect your network and data.
    • Refer to the instructions provided with your router or visit the manufacturer's website for specific instructions on how to turn on encryption.

Staying Safe On Social Networking Sites

+

Despite differing features, social networking sites allow users to share personal information and engage in communication through forums, chat rooms, email, and instant messengers. While most of these platforms are harmless, they may attract malicious individuals due to the ease of access and abundance of personal data available. Using information about an individual's location, hobbies, interests, and friends, a malicious person could impersonate a trusted acquaintance or claim authority to obtain additional personal or financial data.

How Can You Protect Yourself?

+

Limit the amount of personal information you post — especially items such as your address or information about your schedule or routine.

Remember that the internet is a public resource — only post information you are comfortable with anyone seeing. This includes information and photos in your profile and in blogs and other forums.

Be wary of strangers — the internet makes it easy for people to misrepresent their identities and motives. When engaging with unfamiliar individuals, exercise caution regarding the personal information you disclose. Additionally, consider carefully before agreeing to meet them in person.

Be skeptical — don’t believe everything you read online. Try to verify the authenticity of any information before taking any action.

Evaluate your settings — take advantage of a site’s privacy settings. The default settings for some sites may allow anyone to see your profile, but you can customize your settings to restrict access to only certain people. There is still a risk that private information could be exposed despite these restrictions, so don’t post anything that you wouldn’t want the public to see. Sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.

Be wary of third-party applications — third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Use strong passwords — protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you.

Check privacy policies — some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam.

Keep software, particularly your web browser, up to date — install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it.

Use and maintain anti-virus software — anti-virus software helps protect your computer against known viruses, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.

Children are especially susceptible to the threats that social networking sites present. By teaching children about internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users.

ATM Safety Tips

+

Here are a few helpful safety tips to remember when using an Automated Teller Machine (ATM):

  • Scope the area. Make a conscious effort to scope the area immediately adjacent to the ATM machine. Look for suspicious people or situations. If something does not look right, do not make your transaction. Leave the area and use another machine or come back at another time.
  • Limit your time at the machine. Prior to arriving at the ATM site, have your card out to avoid any delay of going through your purse or wallet to find it. At a walk-up ATM, cover your transaction. Use your body to block the keyboard from view. By doing this, you will prevent someone from learning your personal identification number (PIN).
  • Do not publicly show your cash.
  • Always keep your personal identification number a secret. Never give the number to anyone or write it down anywhere. Memorize it or use a secret code if you must write it down.
  • Notify us upon the loss of your card or PIN. Notify us immediately if your ATM card or secret PIN is lost or stolen.
  • Never let anyone use your card or access code.
  • Be on the lookout for ATM “skimming”. ATM skimming is a crime where thieves attach a device to an ATM to capture your card information. Skimming devices can include a small magnetic head used to capture your account information, and a small camera or mirror to view the keypad when you enter your PIN.
  • Be extra careful at night. If you need to access a machine when it’s dark, make sure it’s in a well-lit area and always be aware of your surroundings.
  • Save your receipts and check against your bank statement before destroying.