SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Anatomy of a Scam Checklist: Computer
More seniors than ever are online. The Pew Research Center reports that 53 percent of those 65 and older use
internet or email, and one in three (34 percent) now use social networking sites.* The National Association of
Triads, the Home Instead Senior Care® network and the FBI offer these tips for safer computer use:



Make sure your computer has all the security
it needs and a security updating system.
There are many anti-virus programs available,
ranging from expensive to free, so check
with a trusted source who is knowledgeable
about computers.



Obtain a physical address rather than simply
a post office box and a telephone number,
and call the seller to see if the telephone
number is correct and working.



Avoid sending personal information.
Scammers might send out email on bank
letterhead and say there is a problem
with the account and you need to update
information, password and account number.



Learn to identify spam and scams. Don’t
respond to emails from people you don’t
know or to emails you haven’t expected to
receive. Above all, don’t give out personal
information, including your Social Security
number and banking and credit-card
numbers, to anyone you don’t know.



When making online purchases, don’t give
out your credit-card number online unless the
website is secure and reputable. Sometimes
a tiny icon of a padlock appears to symbolize
a higher level of security to transmit data. This
icon is not a guarantee of a secure site, but it
may provide some assurance; however, don’t
trust a website just because it claims to be
secure.



Make sure you are purchasing merchandise
from a reputable source. Do your homework
on the individual or company to ensure that
they are legitimate.



Guard your account information carefully.
Be skeptical of individuals representing
themselves as Nigerian or foreign
government officials asking for your
help in placing large sums of money in
overseas bank accounts. Do not believe the
promise of large sums of money for your
cooperation.



Send an email to the seller to make sure the
email address is active, and be wary of those
who utilize free email services where a credit
card wasn’t required to open the account.
Check with the Better Business Bureau from
the seller’s area. Check out other websites
regarding this person/company.

http://www.pewinternet.org/Reports/2012/Older-adults-and-internet-use.aspx

Contact local law enforcement if you think someone has scammed your senior or
might be trying to do so. For more about protecting your seniors from scammers,
contact your local Home Instead Senior Care® office, or visit
ProtectSeniorsFromFraud.com.

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.
Anatomy of a Scam Checklist: Computer
For more information about protecting your seniors from scammers, contact your local Home Instead Senior
Care® office, or visit ProtectSeniorsFromFraud.com.
Contact local law enforcement if you think someone has scammed your senior or might be
trying to do so.

	

• Contact 1

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 2

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 3

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 4

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.

Más contenido relacionado

Destacado

Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
Rhenan Belisario
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
Harry Singh
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
Zobia Aziz
 
The five generations of computers presentation
The five generations of computers presentationThe five generations of computers presentation
The five generations of computers presentation
Swarnima Tiwari
 

Destacado (20)

Input And Output devices of computer
Input And Output devices of computer Input And Output devices of computer
Input And Output devices of computer
 
Cpu ppt cse
Cpu ppt cseCpu ppt cse
Cpu ppt cse
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
Printers And Its Types
Printers And Its TypesPrinters And Its Types
Printers And Its Types
 
Presentation on output device
Presentation on output devicePresentation on output device
Presentation on output device
 
Presentation on input devices
Presentation on input devicesPresentation on input devices
Presentation on input devices
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices...
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education ppt
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Touchscreen PPT
Touchscreen PPTTouchscreen PPT
Touchscreen PPT
 
Computer generation
Computer generationComputer generation
Computer generation
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
The five generations of computers presentation
The five generations of computers presentationThe five generations of computers presentation
The five generations of computers presentation
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
 

Más de - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

Anatomy of a Scam Computer Checklist - U.S.

  • 1. Anatomy of a Scam Checklist: Computer More seniors than ever are online. The Pew Research Center reports that 53 percent of those 65 and older use internet or email, and one in three (34 percent) now use social networking sites.* The National Association of Triads, the Home Instead Senior Care® network and the FBI offer these tips for safer computer use:  Make sure your computer has all the security it needs and a security updating system. There are many anti-virus programs available, ranging from expensive to free, so check with a trusted source who is knowledgeable about computers.  Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.  Avoid sending personal information. Scammers might send out email on bank letterhead and say there is a problem with the account and you need to update information, password and account number.  Learn to identify spam and scams. Don’t respond to emails from people you don’t know or to emails you haven’t expected to receive. Above all, don’t give out personal information, including your Social Security number and banking and credit-card numbers, to anyone you don’t know.  When making online purchases, don’t give out your credit-card number online unless the website is secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but it may provide some assurance; however, don’t trust a website just because it claims to be secure.  Make sure you are purchasing merchandise from a reputable source. Do your homework on the individual or company to ensure that they are legitimate.  Guard your account information carefully. Be skeptical of individuals representing themselves as Nigerian or foreign government officials asking for your help in placing large sums of money in overseas bank accounts. Do not believe the promise of large sums of money for your cooperation.  Send an email to the seller to make sure the email address is active, and be wary of those who utilize free email services where a credit card wasn’t required to open the account. Check with the Better Business Bureau from the seller’s area. Check out other websites regarding this person/company. http://www.pewinternet.org/Reports/2012/Older-adults-and-internet-use.aspx Contact local law enforcement if you think someone has scammed your senior or might be trying to do so. For more about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.
  • 2. Anatomy of a Scam Checklist: Computer For more information about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Contact local law enforcement if you think someone has scammed your senior or might be trying to do so. • Contact 1 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 2 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 3 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 4 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.