Video: Tax Fraud
Every tax season, innocent citizens fall victim to tax scams. In this video, you will learn how to identify an IRS masquerading scam by understanding how the IRS does and does NOT communicate with tax payers.
Other Security Awareness Videos
Banking Safety Tips
Urgency scams can play with your instincts. Trustworthy companies won't pressure you for payment or your information.
Don't get hooked by phishing scams!
Don't stay in the dark about imposter scams!
For this attack, time is essential, don’t fall victim to fraudsters who are attacking bank accounts through ACH transactions.
Every year, cyber-criminals try to find ways to capitalize on the stresses of preparing for tax season. But through staying calm, and following these simple rules, we can all keep our money and information safe.
In the first video on foundational cyber-habits, we discussed using passphrases. The second video on this topic will dive into two more practices that will help keep you and your information secure.
Cybersecurity threats continue to evolve, and the frequency of these attacks grow every year. Although cyber-criminals may be getting more sophisticated in their approach, there are some never-changing habits that will always help in securing your data. This is the first part in a two-part video series on foundational cyber-habits.
Child Identity Theft is where a cyber-criminal uses a child’s personal information to obtain services, receive benefits, or commit fraud. These scams can go undetected for years, so to help protect your children’s information and identity, please follow these simple guidelines.
Whether through a phone call, email, or text message, the majority of us have seen some kind of Amazon order scam . These types of scams have been growing in popularity and complexity, resulting in thousands of people losing money every year. Don’t be a victim of a Scamazon Order, protect yourself with these simple guidelines.
Whether it’s through a fake advertisement on social media, or bogus sales through virtual marketplaces, cyber criminals attempt to take advantage of unsuspecting victims every year. During this holiday season, don’t fall for their malicious tricks. Protect yourself and your money with these simple guidelines.
Not all money laundering is done with malicious intent, but the repercussions can still be severe. Take a few minutes to learn how to avoid falling into being a money mule.
Between Card Skimming, Cash Trapping, PIN overlays, and many more sophisticated attacks, ATMs continue to be target locations for thieves trying to steal your money and card information. Take a couple of minutes to learn how you can protect yourself from these ATM scams.
With the increased popularity of QR Codes, cyber criminals have found a way to embed phishing attacks within those barcodes. Check out this video for information on Quishing attacks and how to avoid them.
Summer is a popular time for families to plan trips. It’s also a popular time for scammers to take advantage of families looking for a great deal. Check out this video for tips on how you can avoid falling for these summer vacation scams.
Password security is critical to securing your sensitive information. Watch this video to understand: (1) How to create a complex password that you can remember! (2) How to secure your password. (3) Implementing MFA. (4) Common password protection mistakes.
Your mobile device contains many of the same vulnerabilities as your home and work PC. Understanding these threats is critical to securing your sensitive information. Check out this video to understand those threats and how you can stay secured. Watch until the end for a couple bonus tips!
As cryptocurrency increases in popularity and demand, so does the demand for higher security. Watch this video to understand how you can practice safe security habits with your cryptocurrency and crypto wallet.
Every tax season, innocent citizens fall victim to tax scams. In this video, you will learn how to identify an IRS masquerading scam by understanding how the IRS does and does NOT communicate with tax payers.
Due to the generous nature of many, scammers are seeking the opportunity to capitalize on our willingness to give freely by masquerading as non-profit organizations. Check out this video to understand how you can combat and verify your donations are going to a legitimate 501c3.
When you walk through your home, how many smart devices do you have? Phones, TVs, tablets, security systems, doorbells, thermostats, refrigerators, gaming systems, even light bulbs! Each of these items require access to your home internet and WiFi, which opens a door for cyber criminals. Unfortunately, most devices offer little to no protection against cyber-attacks, so it is up to you to put in place extra protocols to protect your home network.
Children are connecting to the internet and web applications at an all-time high. The importance and urgency of putting protections and boundaries around a child’s internet activity is very important to protecting them. Check out this video to understand how you can protect your children and setup notifications to help you monitor their activities.
As mobile payment app transactions gain popularity, so do the malicious intentions of scammers. Check out this video to understand how you can protect yourself from some of the most common payment app scams.
Beginning July 15th 2021, the IRS will begin sending Child Tax Credit payments. Fraudsters are attempting to use this as an opportunity to steal your information. Check out this video to understand how to identify IRS communication versus the attacker.
As mobile banking continues to become mainstream, users should also familiarize themselves with some common security practices to increase the security of your personal information.
Juice jacking is an attack using a charging port, typically by USB. These attacks aim to install malware onto your device in an attempt to access and steal your sensitive information. Watch to find out how you can avoid these attacks!
Did you know your selfies may lead to a compromise? The oversharing of images is unknowingly handing over personal and company information to snooping hackers. Check out this video to learn more!