Security Education

Prevention Guide

Learn how to identify and protect yourself from various types of phishing, scams, and digital fraud.

How Phishing Works
1

Bait

Scammer creates convincing fake message

2

Hook

Victim clicks link or provides info

3

Catch

Credentials or data are stolen

4

Exploit

Stolen data used for fraud

Common Scam Types

Security Best Practices

Use Strong, Unique Passwords

Create complex passwords for each account and use a password manager to keep track of them securely.

Enable Two-Factor Authentication

Add an extra layer of security by requiring a second verification method beyond just your password.

Verify Before Trusting

Always independently verify requests for information by contacting organizations through official channels.

Keep Software Updated

Regularly update your operating system, browsers, and apps to protect against known vulnerabilities.

Think Before You Click

Hover over links to see actual URLs, and when in doubt, navigate directly to websites instead of clicking links.

Monitor Your Accounts

Regularly check your financial accounts and credit reports for unauthorized activity.

Quick Reference: Red Flags Checklist

In Emails & Messages

  • Urgent language demanding immediate action
  • Requests for passwords, PINs, or OTPs
  • Links to unfamiliar or misspelled websites
  • Attachments from unknown senders
  • Offers that seem too good to be true

Safe Practices

  • Verify sender through official channels
  • Type URLs directly instead of clicking links
  • Check for HTTPS and valid certificates
  • Use official apps for sensitive transactions
  • When in doubt, do not proceed