REAl estate

​​​Financial Scams and How to Protect Yourself Against Them

How To Protect Yourself Against Scams


1. Avoid Phising Bait.


​Phishing is a technique used by criminals to trick victims into providing personal information that can be used for identity theft. Most phishing attempts are carried out by email or phone.

  • Ignore deals and freebies that sound too good to be true, unusual foreign contacts, and requests from strangers for help.
  • Ignore phone calls, emails or texts that appear to be from the IRS. The agency will not contact you by phone, email, text message, or social media to request personal or financial information.
  • Be suspicious of requests for secure information, such as your Social Security number, date of birth, financial account number, email, or password.
  • Never click on a link or download from a suspicious email. If the email claims to be from a company you do business with, go to the company’s website and log in to your account from there.
  • Never provide personal security information over the phone to an incoming caller. If you think the call might be a legitimate request from a company you do business with, hang up, and call the company directly.


2. Monitor and Secure Your Accounts


Many companies, including Fidelity, go to great lengths to safeguard customers’ information and provide security tools. But you need to do your part, too.

  • Choose passwords that can’t be easily guessed, use different passwords for different websites, and change them regularly.
  • Make sure your financial institutions have up-to-date contact information for you. Your contact data is critical to account protection, and your financial institutions rely on that information to promptly inform you of any suspicious activity.
  • Many financial institutions provide an option to sign up for automated alerts of suspicious account activity. Fidelity automatically alerts you by email of certain suspicious activity.
  • Regularly check your credit report. The three major agencies—Equifax, Experian and TransUnion—are required by law to provide you with a free copy of your credit report once every 12 months, which means you can check your report for free three times throughout the year.


3. Guard Your Identity on Social Media


Criminals can compile a surprising amount of information from social media that can open the door to identity theft. Birthdays, family names, schools, and similar details are often used in security questions to access financial accounts. Even photos can provide hints about your tastes, hobbies, and travels, which a crook can use to design a phishing attempt aimed directly at you.

  • Be careful about what you share.
  • Don’t be fooled by a phishing attempt that provides personal details.
  • Be aware that someone you know may use your identity to steal from you. Safeguard your personal information even from them.
  • Security measures aren’t foolproof, and anybody can suffer a moment of inattention or lapse in judgment. Nevertheless, awareness and basic prevention practices can protect you from the vast majority of attempts to steal your identity or money through fraudulent schemes.

Five Most Common Scams

1. Tax Refund Fraud


A criminal files a fraudulent tax return in your name, under your Social Security number, and then collects your refund. Your legitimate tax return is then rejected because the IRS has already processed a return under your identity.

    What To Do:

  • File your return early, before a criminal can file a fraudulent return.
  • If your return is rejected, submit Form 14039, Identity Theft Affidavit, to the IRS.
  • If you receive a letter from the IRS that it has received a suspicious return using your identity, contact the IRS.
  • Continue to pay your taxes and file your legitimate tax return, although you may have to submit a paper return rather than an electronic one.


2. Employment/Health Care Fraud


A person uses your identity to obtain a job or sign up for health care through the Health Insurance Marketplace. You will most likely become aware of this scheme after you have filed your tax return and the IRS notifies you. This notification will consist of an underreported income or an owe to additional tax. For health care, you receive notification that you received a premium subsidy to which you weren’t entitled, based on your income, and you have to pay it back.

     What To Do:

  • If you suspect you are a victim of taxpayer identity theft, immediately contact the IRS and file Form 14039, Identity Theft Affidavit.
  • ​If you believe someone has signed up for health insurance in your name, call the Health Insurance Marketplace call center at 800-318-2596, and explain the situation.


3. Fake Charities

You are solicited by email, phone, or in person to contribute to an organization that sounds like a legitimate cause, but is actually a scam. Such schemes may be general in nature, often using a name very similar to a well-known charity, or they may be more targeted, attempting to prey on people who are victims of a natural disaster or known to have a personal interest in a particular disease or social cause. Beyond being scammed out of your contribution, you might also become a victim of identity theft if you provided a credit card number.

    What To Do:

  • Before contributing, research the charity through the Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar.
  • If you suspect you have been a victim of charity fraud, file a complaint on IdentifyTheft.gov.


4. Ransomware


You receive a phone call from someone claiming to be a technical support person informing you that there is something wrong with your computer and they can help you fix the problem. Alternately, a message appears on your computer screen informing you that you are locked out of your computer or your files have been encrypted, denying you access. If you act as asked by the caller or the screen message, your computer may be taken hostage or personal information stolen. You are then instructed to pay a fee to have access to your computer or data restored.


     What To Do:


  • Prevention is the best medicine. Don’t click on pop-up ads or attachments from unknown senders, don’t respond to scare messages about your computer being infected. Avoid clicking on links in emails. Visit known websites by manually typing the URLs in a browser.
  • Back up your data regularly. That way, you can reboot and regain control of your computer by cleaning your hard drive and reinstalling your operating system.
  • Look into commercial software programs that might be able to restore your files.
  • Ignore suspicious phone calls about your computer and go to your local computer or electronic store if you need help with your computer.


5. Credit Card Fraud


Someone using your identity signs up for a credit card and racks up large charges. This is different than someone using your existing credit card to make purchases. That’s bad enough, but you’re likely to notice it when you get your next statement. A crook who obtains a new card could use it extensively before being discovered.

     What To Do:

  • Report the crime and start a recovery plan on IdentityTheft.gov
  • Notify law enforcement officials.
  • Put a fraud alert on your credit reports, which notifies lenders and creditors that they should take extra steps to verify your identity before extending credit.​​