Skip to main content

  • Phone: 603.926.1189
  • Email: jenel.m.faro@lpl.com
  • Client Login

  • About
  • Services
    • College Savings Plans
    • Retirement Plans
    • Life Insurance
    • Long-term Care and Disability insurance
    • Savings
    • Tax Planning
  • Resources 
    • Weekly Commentary
    • Quarterly Insights
    • Featured LPL Research
    • Forms
    • Blog
  • Contact

    You are here

  1. Home
  2. Blogs
  3. Recognizing and Avoiding Online Scams

Recognizing and Avoiding Online Scams

Submitted by Neville Associates on December 10th, 2020

According to the Identity Theft Resource Center, the number of U.S. data breaches hit a new high in 2017. Nearly 20% of breaches included credit and debit card information, a nearly 6% increase from the prior year. The actual number of records included in these breaches grew by a dramatic 88%.1

This crime occurs when a thief obtains confidential information -- including passwords, personal ID numbers, Social Security numbers, or an account number used with a financial institution -- and uses it to commit fraud. Identity thieves use a victim's stolen information to open bank and brokerage accounts, run up bills for credit card purchases, obtain loans, and commit other forms of financial fraud.

Criminals obtain a victim's personal information in a number of ways -- both online and off. But as incidents of identity theft grows, so too does the arsenal of tools and sophistication level of techniques used to perpetrate the crimes.

Cybercrime: A Rapidly Shifting Model

Although online crime is a fast-moving target, currently, the primary methods in use by identity thieves are social engineering and phishing -- or typically a combination of both.

As the term implies, social engineering relies heavily on human interaction and often involves tricking unsuspecting victims into breaking normal security procedures. In short, it is a way for criminals to gain access to your computer or mobile device and the sensitive personal data it stores. For instance, a social engineer may use text messaging to contact a mobile device inviting the user to click on a link to a bogus website where the thieves collect user credentials and other personal information.

Similar results can be achieved through a phishing attack, in which the criminal uses email to lure victims to fake websites and then gain access to their passwords and usernames, credit card numbers, and other key data. Phishing emails often appear to be from a legitimate company that the victim recognizes.

In yet another instance, attackers may inject infected "malicious" code onto your computer via email attachments, links contained in emails, infected search engine results, or through videos and documents on legitimate websites, particularly social networking sites. In the mobile device world, criminals can corrupt a legitimate smartphone app and upload it to a third-party site. If users innocently install the app, they expose their devices to assaults by hackers who collect personal user data, change device settings, and sometimes even control the device remotely.

Don't Be a Victim

In today's 24/7/365 world, it is nearly impossible to secure all sources of personal information that may be "out there" waiting to be intercepted by eager thieves. But you can help minimize your risk of loss by following a few simple hints offered by the Federal Bureau of Investigation (FBI):

· Never divulge your credit card number or other personally identifying information over the Internet or telephone unless you initiate the communication.

· Reconcile your bank account monthly, and notify your bank of discrepancies immediately.

· Actively monitor your online accounts to detect suspicious activity. Report unauthorized financial transactions to your bank, credit card company, and the police as soon as you detect them.

· Review a copy of your credit report at least once each year. Notify the credit bureau in writing of any questionable entries and follow through until they are explained or removed.

· If your identity has been assumed, ask the credit bureau to add a statement to that effect to your credit report.

· If you know of anyone who receives mail from credit card companies or banks in the names of others, report it to local or federal law enforcement authorities.

Finally, be very wary of any email or text message expressing an urgent need for you to update your personal information, activate an account, or verify your identity. Practice similar caution with email attachments and downloadable files and keep your computers protected with the latest security updates and virus protection software.

Source/Disclaimer:

1"Identity Theft Resource Center, 2017 Data Breaches, 2018.

Required Attribution Because of the possibility of human or mechanical error by DST Systems, Inc. or its sources, neither DST Systems, Inc. nor its sources guarantees the accuracy, adequacy, completeness or availability of any information and is not responsible for any errors or omissions or for the results obtained from the use of such information. In no event shall DST Systems, Inc. be liable for any indirect, special or consequential damages in connection with subscriber's or others' use of the content.

© 2018 DST Systems, Inc. Reproduction in whole or in part prohibited, except by permission. All rights reserved. Not responsible for any errors or omissions.

Categories

  • 3 Golf Tips to Keep Your Retirement Plan on Course (1)
  • 4 Financial Skills All Business Owners Should Learn (1)
  • 4 Way To Boost Your Credit IQ (1)
  • 401(k) (1)
  • 529 College Savings Plans (3)
  • A Guide to Incorporating Philanthropy into Your Financial Planning (1)
  • A Year-End Wealth Planning Guide (1)
  • Annuities (1)
  • Benefits of Homeownership (1)
  • Buying vs Renting (1)
  • Cash Balance Plan Fact Sheet (1)
  • Charting Your Future: Small Business Lessons from Good to Great (1)
  • College Planning (1)
  • Credit Traps For The Unwary (1)
  • Everything You Need to Know About Volunteering During the Third Year of COVID (1)
  • FAFSA (1)
  • Finances (1)
  • financial advisor (1)
  • Financial Planning (10)
  • Financial Wellness (2)
  • From Riches To Rags In Three Generations: Managing Generational Wealth Checklist (1)
  • Home Dilemma 2022 (1)
  • Home Ownership (1)
  • Homeownership (1)
  • How To Spring Clean Your Finances With A Financial Review (1)
  • Investing (3)
  • Investment Management (1)
  • Life Insurance (2)
  • Medicare Will Not Cover All Health Care Costs (1)
  • Mid-November Means Open Enrollment Time (1)
  • Navigating Market Volatility–or Not (2)
  • Planning for the future (1)
  • Retirement (2)
  • retirement planning (5)
  • Rollover (1)
  • Savings (1)
  • Self Employed (1)
  • Small-Business (1)
  • Tax Benefits, (1)
  • Tax Planning (1)
  • Tax Prep (1)
  • Taxes (1)
  • The Basics of the 401(k) (1)
  • Thoughts from a financial professional (1)
  • Wealth Transfer (1)
  • When You Apply For Insurance Your Credit History Counts (1)

Book a Meeting

Tell a Friend

Newsletter Subscription

One Merrill Industrial Drive Suite 15, Hampton, New Hampshire 03842 United States

  • Sitemap
  • Legal, privacy, copyright and trademark information
  • Recommended Reading
  • One Merrill Industrial Drive Suite 15, Hampton, New Hampshire 03842 United States
  • Phone: 603.926.1189
  • Email: jenel.m.faro@lpl.com

Securities and advisory services offered through LPL Financial, a Registered Investment Advisor, Member FINRA/SIPC.

The LPL Financial registered representative(s) associated with this website may discuss and/or transact business only with residents of the states in which they are properly registered or licensed. No offers may be made or accepted from any resident of any other state.

LPL Financial Form CRS

© 2025 LPL Financial. All rights reserved.

Website Design For Financial Services Professionals