Are you at risk?

Imagine This …

  • Your computer freezes and a message appears. The message says that all of your files have been encrypted. If you don’t pay a hefty ransom, you’ll never get your files, documents, and pictures back. You may not get your files back even if you do pay.
  • You learn that someone has opened a line of credit in your name. As far as the bank is concerned, you owe thousands! Someone has stolen your identity.
  • You discover that your bank account is empty. A hacker tricked you into logging into a fake site and stole your login credentials.
  • Someone has hacked into your social media account and posted offensive material, and the posts appear to have come from you.

This does not have to be you! You can enjoy learning, socializing, and shopping on the Internet safely… by learning how to recognize and avoid threats. This series of lessons will show you how!

Your information is online even if you aren’t

Your information is on the Internet even if you don’t own a computer. If you have a bank account, a loan, a credit card, a Social Security number, a frequent flyer number… the information exists on databases on the Internet already. Your travel, Internet searches, browsing history, and purchases are all valuable information collected and sold to retailers for advertising.

Your online accounts and history

Click the tabs below to read more about the risks that these accounts pose.

Top scams of 2019

The FTC (Federal Trade Commission) received over 3.2 million reports of fraud in 2019. Victims lose billions of dollars a year.

  • Imposter scams, like phishing, ranks #1. Scammers pretending to be from the IRS or Microsoft or other businesses and government agencies bilked victims for over $667 million.
  • Social Security scams were the top imposter government-related scam.
  • Romance scams are #1 for total monetary loss. Older adults are especially at-risk for romance (catfishing) scams.
  • Fake check scams result in the biggest monetary loss per incident. This scam disproportionally affects young people because it often begins with a job offer sent to a university email account.

What do these scams have in common?

All of these scams use manipulation, which we discuss in the social engineering lesson, and electronic communication including email, text messages, and robocalls. In the past, scammers went door-to-door and used the postal service. In the digital age, scammers can target billions of potential victims for pennies using software that never sleeps.

You are at risk but far from powerless

You don’t have to become a victim. This series of lessons will help you identify and avoid risks and limit your exposure for risks that may be out of your control.

Test your knowledge

CGOS Risk
Banks, retailers, and the government all store information about you in databases on the Internet, and thousands of databases have been hacked exposing billions of personal records.