Author Archives: admin

Social Media Apps Parents Should Know About

Social Media Apps Parents Should Know About

As children get older and become more independent, their time on smart phones and laptops increase substantially. Yes, you can set screen time limits for them but, as a parent, you likely won’t be able to implement that control continuously through the years. It is important to help your children be aware that predators have the ability to find them through some of the apps they use.

Ways to Help Protect Your Children:

  • Approve every app on your child’s phone
  • Understand how to use privacy settings and check them regularly
  • Discuss what you expect of your children in regard to phone usage
  • Educate yourself and your children on social media etiquette
  • Research the popular apps in your particular geographic area
  • Check your child’s phone periodically for any new apps


These apps can be dangerous and expose your children to a range of events from bullying and unwanted sexual messages to kidnapping and identity theft.

  • DISCORD – is a messaging platform similar to Slack involving chat rooms, direct messaging, voice chat and video calls. Discord has consistently been in the top five platforms for bullying, suicidal ideation, body image, etc. Adult content is rampant.
  • TWITTER (now X) – Once considered as the app to go to for breaking news it is now a go to source for porn.
  • OMEGLE – is an anonymous video chatting platform that pairs you with a complete stranger anywhere in the world.
  • YIKYAK – is another anonymous chatting app that lets users within a five mile radius read publicly posted messages.
  • HOUSEPARTY – a video chatting app that allows friends to communicate with each other through live video and texts in chat groups. The app has no parental controls and by default, is not set to private.
  • YOUTUBE KIDS – a separate version of the popular video-sharing site aimed squarely at children 4+. There have been reports of videos that have kid-friendly titles but are clearly not kid-friendly content.
  • TUMBLER – a micro-blogging site that allows users to share photos, videos and short blogs with a built-in chat function. Although Tumbler banned pornographic content in 2018, it is still possible to see sexually suggestive images and there have been reports of pro-anorexia, and pro-selfharm posts.
  • TELLONYM – a cross-platform messaging app to have questions answered. It was created as a means to give and receive anonymous feedback.
  • BUMBLE – similar to the Tinder dating app but requires females to make the first contact. Children have been known to use Bumble to create fake accounts with a false age.
  • ME – a live-streaming video service that utilizes geolocation so users can find out each broadcaster’s exact location. Users of this app can earn”coins” as a way to “pay” minors for their photos and videos.
  • ASKFM – a cyber-bullying app that encourages anonymous people to ask anonymous questions. The answers are then used to cyber bully the account holders.
  • SNAPCHAT – most popular app amongst middle and high schoolers. Users can take photos/videos and create “storie” that can be viewed for 24 hours before it disappears. This app also has geolocation so users can see each person’s exact location.
  • HOOP – Hoop has been described as Tinder meeting Snapchat. Children as young as 12 can form connections with complete strangers.
  • ROBLOX – is similar to the popular game Minecraft that children 5+ are able to use. It has user-generated content and an in-game chat feature. Content such as profanity, sex, drugs and alcohol are often run into. This app is also another potential for predatory adults to message children.
  • HOLLA – is one of the most self-proclaimed addicting video apps where users can chat with people all over the world in just seconds. Racial slurs, explicit content and identity theft are to be expected.
  • CALCULATOR% – is one of several secret apps used to hide photos, videos, files and browser history. The app looks like a calculator but functions like a secret photo vault.
  • KIK – provides account holders unlimited access to direct message anyone anywhere. This free app also has built-in apps and web content that would be typically filtered on a home computer.
  • WHISPER – another anonymous social network that promotes the sharing of secrets with strangers. A user’s location can be revealed so people can meet up.
  • HOT OR NOT – this app encourages users to rate your profile, check out people in their geographic area and chat with strangers with the goal of hooking up.
  • OMEGLE – is a free online chat website that promotes chatting anonymously with strangers.
  • YELLOW – another “Tinder” like app that allows teens to flirt with each other.
  • BURN BOOK – known to be the app where anonymous rumors can be spread through audio messages, text, and photos.
  • WISHBONE – allows users to compare kids against each other and rate them on a scale.
  • INSTAGRAM – is a very popular photo/video sharing app that allows users to assign filters to photos and share them with their followers. Everyone who creates an Instagram account has a profile as well as a newsfeed. There are privacy settings that can make accounts public or private. It is popular for children to create fake accounts with fake names, ages and pictures.

New apps are developed daily so stay in the know regarding the social media scene and what your children are talking about with their friends. Utilizing the same apps your children use can also help you keep up-to-date on what privacy controls are available and how they work.

Guard Well Identity Theft Solutions exists to provide you, your family, and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

Note: this blog has been updated as of August 8, 2023.

Photo credit courtesy from

Quick Steps for Lost Wallet

Quick Steps for Lost Wallet

You know that flustered feeling when you can’t find your cell phone? Imagine if you had your driver’s license, ATM debit card and your AMEX in a pocket inside your phone. Not only would you have a lost wallet, but you would have a lost cell phone as well. Talk about panic.

There are many reasons why you should not carry every ID you have on you at any given point in time. Your Social Security card … should be in a safe. Your passport should be in there as well. If you own more than one credit card, don’t carry all of them in your wallet at the same time. Your health insurance card? Now, that’s a toss-up.

Before a lost wallet scenario could happen to you:

• Make a detailed list and/or keep photocopies of the contents in your wallet in a safe place (ideally in a home safe or bank lock box). Make sure phone numbers are included for your providers as well so you can swiftly contact your creditors if the moment arises.

What to do if you have a lost or stolen phone, wallet or both:

• Call your bank(s) immediately to report your debit and/or any credit cards as stolen. This is different from canceling or closing your credit cards, which can cause problems with your credit reports. “You’re only responsible for up to $50 in unauthorized purchases if you report a debit card as missing within two business days of the loss. But, if you wait more than two days (but less than 60), you could be on the hook for up to $500 in unauthorized purchases.
• Call your cell phone carrier if your lost wallet also included your phone. Service providers have tracking that can help trace the footsteps of your burglar as well as the ability to shut off any apps, suspend social media accounts and email for the time being.
• File a police report.
• Initiate a fraud alert on your credit report.
• Replace your driver’s license as soon as possible. Every state has different requirements for replacing a license. Some may ask you for a police report number if your ID has been stolen.

• IF your Social Security card was in your wallet (not recommended), contact the Social Security Administration immediately. They can send you a new card but they won’t give you a new number.

• Download a credit report. If you see anything you don’t recognize, call the IRS Identity Protection Unit 800.908.4490.

What types of cards and documents can be replaced?

It can be overwhelming when we think of everything that could be in our wallet. Your driver’s license, debit card, passport, military ID, health insurance card, Medicare/Medicaid, auto insurance card, US Visa or residency card, even retail store cards and any specialized license or driver’s permit all can be replaced, but it takes time.

It’s best to minimize what you carry with you. Our Lost Wallet service assists our Members in quickly and effectively terminating and re-ordering wallet contents. Our services include:

• Identifying missing documents.
• Contacting document issuers while Member is on call (if required by issuer).
• Cancelling of all lost cards and report documents missing.
• Completing the required forms and delivering to subscriber for completion.
• Initiating fraud affidavit and police reports for stolen wallets.
• Additional resolution calls based on the severity of issue, as needed

The Rise in Health Care Fraud

The Rise in Health Care Fraud

Health care data is increasingly becoming a top target for scammers and hackers. A reason why fraudsters may be going after health care data more is because of its longer shelf life and rich potential for identity theft. Financial data has a finite lifespan and loses its worth as soon as the consumer notices the frauds and cancels their accounts or cards. However, health care data contains information that can’t be cancelled or changed as easily as a credit card.

Every year, with the exception of 2015, the number of healthcare data breaches has increased 70%, rising from 199 breaches in 2010 to 344 in 2017.[1] According to a study published by the Journal of American Medical Association, “those breaches have resulted in the loss, theft, exposure, or impermissible disclosure of 176.4 million healthcare records. 75% of those records were exposed or stolen as a result of hacking or IT incidents.” Medical identity theft not only affects the patient (consumer), but has potentially disastrous ramifications on insurance providers as well as the healthcare providers.

What is medical identity theft?

Medical identity theft occurs when a fraudster illegally obtains and uses a patient’s Personally Identifiable Information (PII), such as name, Social Security number, and/or medical insurance identity number, to fraudulently obtain or bill for medical goods or services. This kind of fraud also includes the unauthorized personal gain of insurance benefits, prescription drugs, employment, government benefits, or other financial gain acquired through the theft of another individual’s PII. Hackers have also been known to sell stolen health care records on the black market.[2]

The ten largest data breaches of patient data in 2018 involved email, targeted phishing attacks, and database misconfigurations. The largest health data breach during this same time was caused by a hack on a billing vendor, AccuDoc Solutions. 2.65 million Atrium Health patients were involved in the breach.

Who is at risk?

Everyone is at risk for medical identity theft but seniors are increasingly targeted. Navigating the Medicare system isn’t easy to begin with. When confusion enters the picture, scammers view it as an especially ripe time to take advantage of the ever-growing aging population. Always keep in mind that Medicare will never call to ask for sensitive personal financial information.[3]

How can you help protect yourself?[4]

  • Review the Explanations of Benefits (EOB) statement or Medicare Summary Notice that your health plan sends after treatment. Immediately report any mistakes or unfamiliar charges, such as a doctor’s visit you did not make or prescriptions that you did not fill.
  • Check in with your doctor(s) to ensure your medical records are accurate. Make sure the records contain your procedures, treatments, prescriptions, and other medical activities. If you notice inaccurate health details such as the wrong blood type, pre-existing conditions, or allergies, it may be a sign that an identity thief has accessed your records.
  • Get a copy of your medical records periodically and keep them in a safe.
  • Do not share your medical or insurance information with other individuals.Especially do not provide your medical information over the phone or via email unless you initiated the contact and have verified the entity you are contacting.
  • Treat your medical identity with the same care and caution you do any of your other sensitive information, such as your financial credentials. Shred health documents you no longer need. Peel the labels off of your prescription bottle and shred them as well.
  • Read the Privacy Policy on a website before you provide your Personally Identifiable Information. Find out why your Social Security number or insurance account numbers may be needed and how the website will keep it safe, or if it will be shared, and if so, with whom. (Websites with “https” in their URL are secure.)

If you are unsure about sharing your personal information with someone who says they are from your health plan—DON’T. Directly contact the Member Services number on your ID card so you can be sure the person is a verified health representative.

Don’t Let Identity Theft Become a Vacation Memory

Don’t Let Identity Theft Become a Vacation Memory

We all look forward to vacations … time off of work, fun with the family, a few days of laziness… but, when we are excited about buying sunscreen and new flip-flops, we need to remember that there are some other ‘things to do’ on our checklist to help keep our family and identities safe.


In addition to finding pet care, remembering your passport and making sure your lighting is on schedule, there are some pre-, during and post-trip items that you can do to help prevent identity theft from becoming a huge vacation memory. Just some small preventative measures like updating the operating system and antivirus software on your mobile devices can go a long way toward fending off a few identity thieves.


Before you leave home:

– Password protect your devices and update operating systems

– Alert your bank(s) about your travel plans

– Visit your post office and put your mail on a vacation hold

– Keep the number of credit cards you travel with to a minimum and have copies of your driver’s license, medical id cards, passports and travel confirmation numbers at home in a safe place

– Turn off auto-connect Wifi and Bluetooth connections

– Consider adjusting your social media account settings so posts aren’t tagged with GPS data


While out of town:

– Avoid using public Wifi and even your hotel’s if at all possible

– Do not use public computers

– Keep your travel documents in a hotel safe

– Log out of websites on your smart phone and any websites if you bring a laptop or other device with you on your trip


Upon your return home:

– Consider changing passwords for your major accounts

– Thoroughly go through your account statements for any irregularities

– Check your credit report to make sure no new accounts were opened in your name while you were away


We hope you have a wonderful vacation. Stay safe! If you are concerned that identity theft has happened to you, reach out to us immediately day or night at 888.966.GUARD (4827) or email us at [email protected].

Taking the Mystery out of Shopping Scams

Taking the Mystery out of Shopping Scams

It’s no secret that being a mystery shopper for a reputable company is a legitimate way for an individual to earn some income. Mystery shopping, also known as secret shopping, is estimated to be a $1.5 – 2 billion dollar industry with over 8.1 million mystery shops conducted a year. This profitable enterprise has been around for decades.

Contrary to what many believe, mystery shoppers don’t get paid to shop. They are independent contractors who pose as shoppers in order to gather data about the customer experience in a specific environment. Mystery shoppers complete reports, often using an online form, after leaving the establishment they observe. They get paid for their work and do not front any money first in order to work.

Fake check fraud is an exploding epidemic and scams involving the mystery shopping industry have made a big comeback … unfortunately, our tech-savvy teenagers are the targets of late.

Anyone with a bank account and the desire to make some extra cash on the side can be a victim. High school and university students across the nation are increasingly being pursued. Why students? Students are easy targets for scammers due to their need for money to help fund their education.

Thousands are being contacted and thousands of dollars are being lost. The latest mystery shopping scam reported in the media last month disclosed that University students in Fargo, North Dakota had been targeted. One devastated student ended up losing $3,850.75. Being educated on how this type of scam operates will help prevent this from happening to you and your child.

How Does a Mystery Shopping Scam Work?

  • Scammer reaches out to victim with an offer in the mail to be a secret shopper and a check is included. Often times the amount on the check is for over a thousand dollars. The victim is told to deposit the check and understands that they will eventually keep several hundred dollars as payment for their upcoming shopping services.
  • Victim deposits the check and waits the expected day or two for the funds to clear. Note that even if the bank says the funds are available in a couple of days, the process of uncovering a fake check can take financial institutions weeks.
  • Victim is asked to buy something. Typically, the first shopping task is to test the in-store money transfer service like Western Union or MoneyGram by sending some of the money that was deposited back to the company.
  • Victim is then asked to buy a product, “often from a Walmart,” according to the Federal Trade Commission. Common items purchased are reloadable gift cards, such as iTunes. Part of this task requires the victim to send pictures of the purchased cards or to give the numbers on the cards to the company.
  • Two to three weeks later, the victim receives a notification from their bank that the deposited check was a fake. The realization that they have been scammed sets in. Victim is responsible for paying back the amount to their bank. Another unfortunate bonus is that the reloadable gift cards that the victim had purchased are suddenly empty of funds.


What Can You Do?

Help stop these scammers from making money. Educate your children about the issue. Explain what check fraud is. Let them know that they should never pay to become a mystery shopper. The fact that these scammers are targeting our children is another great reason to make sure that your identity theft protection covers every member of your immediate family.

Can You Spot When You’re Being Phished?

Identifying phishing can be harder than you think. Phishing is an attempt to trick you into giving up your personal information by pretending to be someone you know. Phishing attacks “cost organizations $4.5 billion every year and over half of internet users get at least one phishing email per day,” according to Dell EMC.[1]

Tips to Identify Phishing:

  • Even if you recognize the display name (for example, the email is from your bank) and there is a generic salutation like “Dear Trusted Customer” instead of “Dear [your first name],” request that your institution verify the email was indeed from them.
  • Poor grammar in the body of any email is a red flag as are spelling mistakes.
  • Hover your mouse over any hotlinks in the email. If the link address has any type of spelling mistakes, highly likely the email is phishing.
  • Understand that the financial and insurance institutions you do business with will never ask for your credentials.
  • Don’t click on attachments. Take the extra minute or two to verify the information in the attachments.

What You Can Do:

  • If there is an opportunity for you to activate two-factor authorization, do so. Two-factor, also known as 2FA, is a method of confirming users’ claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.[2] If this feature is enabled, that is your best bet against phishing. Even if someone steals your password they won’t be able to access your account.
  • Check out Jigsaw, a Google offshoot, owned by Alphabet. Jigsaw is trying to teach the public on how to be more cautious. They recently released an online quiz that displays examples of phishing emails side by side with legitimate ones and asks users to guess which is which. The quiz was created based on security training from journalists, activists and political leaders around the world. You can take the quiz by clicking

Phishing is a cybercrime. If you have been targeted, contact your identity theft resolution provider as soon as possible. Your personally identifiable information (PII) should be yours and yours alone.



How to Protect Yourself During the U.S. Government Shutdown

Tax season and scams usually go hand in hand. With the longest government shutdown in history occurring during the same timeframe (January through April), there are added concerns.

Today marks the 32nd day that over 800,000 federal workers are not receiving pay, with 380,000 of them having to still report to work. Additionally, millions of government contractors are impacted, such as IT, research and project management professionals, as well as lower-wage janitors, security guards and cafeteria servers. While some federal employees may receive back pay when the government gets back up and running, contractors will not be reimbursed for this time off. Many are already receiving notices that their health insurance coverage has expired or will in the next few weeks[1]. With lapses in health insurance, medical identity theft will undoubtedly be on the rise.

Government shutdown or not, scammers are always hard at work trying to get your identity and money. During this time period it is going to be even easier for them to do so especially with nine out of 15 critical federal agencies and departments being closed.

The Federal Trade Commisson (FTC) is the government agency where you would file a report if your identity is compromised. The website that you would use to file said complaint with the FTC is If you visit the website today, you will see that it has temporarily disappeared. Instead, a notice appears saying that operations will resume when the government is funded. If you can’t contact the FTC, where do you go for help if you suspect identity fraud has occurred?

What You Can Do

There are some immediate steps to take if you think your identity has been compromised:

  • File your taxes early. The best way to avoid a tax scam is to file your taxes as early as possible. The Internal Revenue Service (IRS) will still be reviewing tax returns. Unfortunately, if you are due a refund, that money will not provided until the government is funded.
  • Partnering with a reputable identity resolution provider is critical. Make sure that the identity theft coverage includes monitoring and full resolution services. Advanced monitoring uses powerful technology to scour billions of identity records and non-credit sources to detect fraud in credit, non-credit and public records. Full resolution involves many steps required to replace government documents, such as your driver’s license and passport, as well as protect your credit score.
  • File a police report and request a copy of it. You will need to give copies of the report to creditors as well as the credit bureaus.
  • Contact your bank(s) and/or insurance institutions and dispute fraudulent activity on the accounts.
  • Consider a credit freeze or fraud alert. A credit freeze locks down your credit while a fraud alert allows creditors to receive a copy of your credit report. Fraud alerts can prevent someone from opening an account in your name but they will not stop your existing accounts from being compromised. For victims of identity theft, an extended fraud alert can protect your credit for seven years.

During this uncertain time when we as individuals have no control over the government shutdown, taking some proactive steps to help keep our family safe and identities secure is more important than ever.

[1] Nova, Annie. CNBC. January 23, 2019

How A Data Breach Can Impact You

How A Data Breach Can Impact You

Many of us are familiar with the term ‘data breach.’ However, not all of us are too familiar with how impacting a data breach can be, both for you personally, and for your business.

What does it involve?
A data breach involves the release of secure or confidential information. This information is then shared in an often unknown and always untrusted environment. In most cases, if your company finds that a data breach has occurred, it will have involved your private data being stolen and shared via an unauthorized source. Additionally, some data breaches are caused due to intrusive or harmful software. This malware can further disrupt your IT and computer processes, and may even delete, hold to random or steal valuable business data.

What data can be stolen?
The information acquired could include:

  • Your personal information, such as Social Security number and contact information
  • Your financial information including bank account details
  • Health information of individuals
  • Intellectual property such as material your business has developed
  • Legal information
  • IT security data.

What could this mean for my business?
A data breach can leave you at risk with various results. Identity theft is common, for example, if the hackers decide to act upon the information they find. Below outlines a few other ways that a data breach can impact a company and why it can be so damaging to your business.

  • Revenue loss

Your business could suffer a significant revenue loss as a result of a security breach. A non-functional website could contribute to this, as customers will potentially look elsewhere if it appears your company isn’t up and running as standard. Work patterns are often disrupted with a data breach too, which can also have an effect on your overall output and revenue. In general, the primary damage of data breaches and cyber-attacks is the loss of money for a company or individual. It has been forecast, for example, that by 2021, cybercrime damages will cost the world $6 billion.

  • Brand Reputation

Your long-term reputation could be severely impacted by a data breach. A breach involving emails, for example, can set back your company due to the ongoing issues this could cause. Taking it one step further, the information about your customers is vital to keep safe, too. Breaches may often involve customer payment information. Many will take their business elsewhere, or be hesitant in the first place to trust your company with their information if they hear a data breach has recently occurred. Some data breaches can potentially shut the doors of your business and be hard to come back from.

  • Loss of intellectual property

As well as private information, a data hack can be taken one step further and may involve hackers targeting strategies, blueprints, and designs that are your company’s by right. Many small businesses think that they will not be affected by this; however, small businesses are often targeted more, quite simply because they are easier to hack. A loss of intellectual property can impact your business’ competitive edge, and take you back to square one if specific software is accessed, for example.  

What now?
If you are concerned about where your company stands with its online protection, then talk to us, as we can recommend solutions and protection for you and your employees, meaning you can rest assured knowing your company is in good hands.

The Lasting Impact of Fraud

The Lasting Impact of Fraud

Unfortunately, fraud and identity theft are crimes which do not appear to be slowing down, with an incredible 44% increase in the number of data breaches last year. It is a prevalent issue throughout the US, with the crimes affecting all areas of society from stay-at-home parents to multibillionaire corporations with an outstanding 16.7 million of American’s impacted in 2017 alone.

The majority of Americans know what fraud and identity theft is. After all, it’s something we are taught in school, and the steps to take to protect yourself are widely discussed. We know the importance of keeping private data exactly that – private. What is less commonly known, however, is the lasting impact this terrible crime has for those who feel its effects. Often, the waves caused by identity theft and fraud can be lifelong, which can be categorized into two main pillars.


Perhaps one of the more well-known issues which arise due to identity theft is our financial wellbeing and stability. The damage this crime can do to your financial future can impact every area of your life, from your mortgage and rent payments, your retirement fund, even your child’s educational future. If a criminal accesses the pot of money you’ve saved to send your little one to college, the chances of recovering the amount is extremely slim.

Identity theft will also affect an individual’s credit rating, which then impacts on their financial future indefinitely. A low credit score can prevent you from being accepted for a mortgage, receiving investment for a new business, allowing you to take out finance for a new car, being rejected for a rental agreement, and so on. One way to protect your credit rating, however, is to ensure you regularly check it. This way, any anomalies you discover can be addressed sooner rather than later, minimizing the potentially damaging impact.

Similarly, if an identity thief gets their hands on your Social Security number, there’s no stopping them from committing Tax Refund Identity Theft, which means that sum of money you were looking forward to receiving is lost. The numbers for Social Security number data breaches is astounding: 158 million numbers were exposed in 2017. When a thief has hold of your Social Security number, it’s not something you can ignore or forget about; this number can then be sold on the dark web, potentially even years after the data breach has occurred. To recover from this specific identity theft, you will need to work closely with experts, and even the government.


There’s no denying that identity theft is an incredibly challenging and stressful situation to be in. The impact it has on your emotional well-being can be felt throughout the whole family. The most common emotional responses to fraud and identity theft include:

  • Anger
  • Shock
  • Guilt
  • Stress
  • Anxiety
  • Helplessness
  • Panic
  • Loss of confidence and self-worth

As this particular crime is one which there’s no way to predict, and often, it goes unnoticed for a period of time, the shock alone can trigger a horrible emotional response, one which doesn’t simply go away after a set amount of time. The emotional toll can play on a victim’s mind for many years. Anger is especially prevalent, but it is not always directed solely at the thief. It is common for victims of identity theft to blame themselves, and sometimes even blame family members. This blame then creates a domino effect, with a victim’s self-worth and confidence taking a knock, becoming especially anxious whether this crime could affect them again.

To Conclude

Unfortunately, identity theft and fraud appear to be growing in numbers, rather than decreasing. While this is a worrying statistic, there are ways to protect yourself against the unscrupulous individuals who seek to steal your data. By working with privacy experts, such as our team of specialists, you can resolve any worries and fears, recover any identity thefts, and work tirelessly to ensure it doesn’t happen again.

3 Common Back to School Scams

3 Common Back to School Scams

You may think your children are safe; however, no matter the age of your child, whether they are a pre-teen or young adults, they are never out of the reach of cybercriminals and scams. The best way to protect your children is to teach them the signs of an untrustworthy email or a suspicious phone call. By doing so, you are protecting them when you may not be present.

If you, yourself, are unaware of what to look for, here are the 3 common back to school scams you should be familiar with.

Phishing Scams

Students who are, for instance, heading to university should be wary when it comes to their emails. The phishing scams that usually circulate this time of year are trying to get you to share your personal details, for the purposes of identity theft and fraud. Be cautious of any emails sent with regards to any loans you may be taking out, or if your bank or university themselves are asking for financial or personal details.

The best way to snub these emails is to phone the company they are perpetrating to be. They will be able to say whether they sent you an email or not. If it is the latter, you can ignore the email. Of course, if you do accidentally fall prey to a phishing scam, there are professionals in identity fraud who can help you out. You should also notify your bank immediately.

High School Diploma Scams

Not all of us complete our high school diplomas in the usual settings, and so if you are returning to high school or completing your diploma via online learning, you need to be cautious about the company or facility you are putting your trust in. Not only do these types of scams cost you money, but at the end of the day, the victim still won’t have a diploma.

The usual red flags consist of you having to pay for a diploma, being able to earn a diploma in a short amount of time (a couple of days or so), and being able to take the test online (these tests are never administered over the internet).

Scholarship Scams

College is not cheap, and unfortunately, some students have to take out loans for them to be able to pay for their education. Fraudsters, therefore, have found ways to offer fake scholarships to soon-to-be students. To protect yourself, follow these following tips:

  • Never pay for your scholarship. You will never be expected to pay fees or taxes, so if they ask you for any payment, it is a scam, and you should ignore it.
  • If a company guarantees your scholarship, this is, sadly, a sign of a scam. While companies are looking to help students, they can never guarantee a scholarship, and so this is a major sign of fraudulent activity.

You can never be too trusting when it comes to protecting your identity and finances, especially when it comes to securing your future with regards to school and tuition fees. Therefore, be sure to question any unusual activity, and if you are ever unsure, ask for proof by phoning up the company and confirming the email of the person they are claiming to be.