The art of scamming has grown from phone calls and emails to include multiple social media sites

Scams are everywhere!

Image of a yellow yield traffic sign that contains a photo of a laptop computer and the words "CYBER SAFETY'.Human beings have built civilizations on trust and honor. We trust our students to perform their educational responsibilities in an honorable manner. Students trust us to enlighten them by telling the truth and teaching them using scientific facts and findings.

Trust helped us to build our society but at the same time it may be one of the weakest traits we have as human beings, and scammers are taking advantage of this strength and weakness.

A ‘scam’ is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person (computerhope.com).

Phone calls and emails are the most commonly used methods to perform scamming actions. However, social media is another favorite method to spread scams. Facebook, Twitter, and Instagram are used to convince users to spend money on items that do not exist.

For example, an advertisement for a 20TB SSD card pops up in your feed at an incredible price, you click on the promotion, and it sends you to a page with even more incredibly priced products at a low price. However, the certification information shows that the website has been active for only a few days, but you order it anyway. You wait for the device and it never shows up and customer service does not answer the phone.

If something appears too good to be true, it probably is. Check the warning signs, and instead of following the links on the social media platforms, go directly to the product or service websites. Contact IT Services for assistance if you have any questions or concerns.

Posted in: News, Newsletter, Security
Read more about: , , , ,

Comments are closed.