Suspicious emails, texts & phone calls (social engineering)
Learn how to spot a fraudulent email, text or phone call, so you’re not reeled in.
Social engineering
Fraudsters are always looking for different ways to gain access to your information and devices and one technique they use is called ‘social engineering’. Social engineering uses manipulation to trick people into making security mistakes or giving away sensitive information. The main skill required to overcome its deceptive tactics is vigilance. This approach focuses on human emotions, which means how you think and act can determine if these attacks are successful.
Social engineering scams can come in many different forms using many different mediums. The most common types include:
- QRishing phishing Using QR Codes which link to scam websites or apps.
- Lookalike websites Creating realistic-looking copies of legitimate websites.
- Domain spoofing Faking website name or email domains.
- Smishing Phishing using SMS/Text messages or social messaging apps.
- Phishing Emails with fake offers, instructions and links.
- Vishing Phishing using voice i.e: phone calls.
Protect yourself from social engineering attacks
Remember, social engineering relies on manipulating human behaviour so there are some simple steps you can take to protect yourself:
|
|
Your email can contain important information that fraudsters can use to impersonate you.
It is important you protect your emails by:
- Reviewing your sent mail folder regularly and deleting sensitive documents e.g. photocopy of ID document or financial statements which fraudsters may be able to use to impersonate you.
- Review your mailbox to ensure no rules have been set up to redirect or delete emails received.
- Set up Multi-Factor Authentication (MFA) to access emails.
Spotting and avoiding suspicious emails and phone calls
It's not always clear you're being targeted. Fraudsters will impersonate genuine organisations and firms to convince you to provide usernames, passwords for online accounts and emails. They may contact you to say they have concerns or inform you there is fraudulent activity on your account and then ask you to provide remote access to your computer or device. Be aware, trust your instincts and take your time. Don’t rush into providing any personal details or sending monies. It’s okay to hang up the phone, ignore emails and to obtain information by researching trusted sources.
Suspicious sense of urgency
Unexpected calls, emails, text or social media
Requests for personal information and passwords
Emails with suspicious or mismatched URLs
Poor spelling or grammar in emails
Fraudulent remote access requests
Where to get help
If you’ve received an email or call from someone posing as Fidelity contact us on 0800 358 7712. Here are some other useful contacts.