Guest Post: Consumer Protection Week Dedicated To Guarding Americans Against Scammers

This week is Consumer Protection Week. Annually observed during the first week of March, the Week was created with the intention of educating consumers of their rights and how to protect themselves from scams in the digital age. In 2020 alone, Americans lost a record-breaking 4.2 billion dollars in online scams. Despite consumers growing increasingly familiar with these scams, millions still give in to bad actors and put their information at risk.

If you are covering Consumer Protection Week, a Lookout expert is happy to comment on how to recognize consumer scams and share tips on how to protect themselves from hackers. Lookout is a cybersecurity company delivering integrated Security, Privacy, and Identity Theft Protection solutions. 

Lookout Suggests These Basic Tips For Common Scams:

Text Scam
If you receive a phishy text message that creates a highly urgent situation, find a way to validate the communication before tapping any links or downloading any apps.

WiFi Connections
Exercise caution when using public WiFi as there may be others snooping on network traffic. In particular, avoid making purchases and banking transactions—any communication that conveys a password, account number or credit card number—unless you are certain that you are on a secure connection.

Password Hacks
Use multi-factor authentication when signing into any account that offers it. This makes it harder for bad actors to get in, even if they compromise your username and password.

Verify The Source
If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. You can contact the company using information provided on an account statement or by visiting their website directly online, not information provided in an email. 

Install security software on your devices
Security protection, like Lookout, will automatically monitor and identify scam URLs in email, text messages, and on the web and block you from threats that can do harm.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: