1. Contact Us
  2. Find an Agency
  3. To Cinfin.com
  4. Careers

The Cincinnati Insurance Companies

logo for printing

Subscribe to our blog

[jetpack_subscription_form]

Navigation
  • Blog Home
  • About Us
  • Contributors
  • Guidelines
  • Prepare
    • Distracted Driving
    • Earthquakes
    • Hurricanes
    • Storms
    • Wildfires
    • Winter

Phished! What now? Some steps to recovery

By Cincinnati Life

pop-up-computer-message

Pop-up screens can be phishing scams.

 

It could happen to anyone. You’re innocently browsing news headlines, checking the latest sports scores or searching for the perfect pair of shoes when out of nowhere you get a pop-up warning that a virus was detected on your computer and you need to contact Microsoft immediately. Conveniently enough, the pop-up also provides you with the Microsoft support number. It says Microsoft and seems legitimate. What could go wrong? 

Someone – we’ll call him Wilson – recently received a warning like this on his personal laptop. Wilson tried closing the pop-up, but it wouldn’t close. He tried rebooting his computer, but the pop-up just came back (warning sign #1), so he figured it must be legitimate. He called the phone number provided in the warning. A nice person identifying himself as “Microsoft Support” answered, gained access to the computer and quickly began to assist in removing the virus from Wilson’s computer.

The representative claiming to be from Microsoft said he needed a credit card number (warning sign #2) to work on eliminating the problem. Reluctantly, Wilson gave the representative the information because he wanted to restore his laptop. The rep gave Wilson the option to pay $249.99 to eliminate the virus and receive three years of protection against getting a virus in the future, which Wilson declined. The representative identified the virus as Zeus Trojan and indicated that this type of software problem wasn’t covered under any warranty.

Wilson received an email from a payment service company asking if he approved $249.99 charges for services rendered and if the services provided were satisfactory before they processed the charge. His immediate response was that he had not authorized any charges and would challenge any charges. Needless to say, the charges went through anyway.

Wilson teamed up with a professional tech service but still took months to recover from the incident. To avoid being phished in the first place, Wilson could have called his own tech support service to confirm the message on the pop-up warning. He could have sought Microsoft support himself through independent channels, not through the phone number on the pop-up.

So what do you do after your information is compromised?

  • Change your passwords – Hackers are trying to get your accounts and account details. It is very common for user names and passwords to be shared and used to compromise other accounts. It is best to change passwords for all your online accounts, including financial institutions, email and social media. When changing your passwords, make the new one more challenging by using a combination of upper and lowercase letters, numbers and special characters. Don’t use dates, kid or pet names or repeated characters.
  • Check your machine – Scan your computer for any viruses, spyware and malware. These can be used to steal account information and track your keystrokes or Internet traffic. Don’t be too proud to solicit assistance from professionals to clean up your machine and make sure it is protected in the future.
  • Verify and protect your accounts – You’ll want to verify that none of your accounts have fraudulent charges or provide authorization to third-party programs. If any accounts have shipping information, make sure it is still accurate. Close any accounts that were accessed and report any fraudulent charges to the financial institution. It is also a good idea to place a fraud alert on your credit reports.
  • Let other contacts know – If your email or social media accounts were hacked, or if you clicked on a link on a malicious website or in a malicious email, emails may be sent or posts may be made on your behalf that could potentially spread spam and malware.

Make sure your computer’s anti-virus software is up to date, and schedule a scan regularly. Make yourself familiar with the various types of phishing scams, viruses and malware. In addition to placing pop-ups on websites, some scammers are placing phone calls, claiming to be from Microsoft or other legitimate services. Here is a good source from OnguardOnline.gov about the various types of threats and how to protect your computer. Remember, the more you know about cybersecurity and how it affects you, the easier it is to protect your computer and private information.

This loss control information is advisory only. The author assumes no responsibility for management or control of loss control activities. Not all exposures are identified in this article.


Share This Blog:

Share This Blog:


 

Comments are closed.

Find an Agency

  1. Advanced Search
  2. Our Agents
Claims Quote

CATEGORY TOPICS

  • Business Insurance
    • Contractor
    • Craft Beverage
    • Educational Institutions
    • Fitness & Recreation
    • Health Care Facilities
    • Hospitality
    • Machinery & Equipment
    • Social Services
  • Catastrophe
    • Earthquake
    • Flood
    • Hurricane
    • Spring Storms
    • Wildfire
  • Consumer Tips
    • Autumn Prep
    • Storm Prep
    • Winter Prep
  • Life Insurance
    • Business Life
  • Lifestyle
  • Pandemic
  • Personal Insurance
    • Capstone
    • Home Construction
    • Home Maintenance
    • Home Protection-Fire
    • Home Protection-Safety
    • Home Protection-Water
    • Risk Management
    • Valuable Articles
    • Valuation
  • Safety Tips
    • Distracted Driving
    • Fire Prevention
    • Loss Control

Subsidiaries of Cincinnati Financial Corporation

  • Youtube Icon
  • Blog Icon
  • Facebook Icon
  • Instagram Icon
  • Linkedin Icon
  • Businesses
  • Individuals
  • Claims
  • Agents
  • Investors
  • About
  • Careers

For information, quotes or coverage availability, please contact your local independent agent representing Cincinnati Insurance. For policy service, please contact your local independent agent or send us an email. Property and casualty coverages may be provided by The Cincinnati Insurance Company or one of its wholly owned subsidiaries, The Cincinnati Indemnity Company, The Cincinnati Casualty Company or The Cincinnati Specialty Underwriters Insurance Company. The Cincinnati Life Insurance Company provides life insurance and fixed annuities. Each insurer has sole financial responsibility for its own products. Not all subsidiaries operate in all states. Location: 6200 S. Gilmore Road, Fairfield, OH 45014-5141 Mailing address: P.O. Box 145496, Cincinnati, OH 45250-5496. Copyright © 2023 Cincinnati Financial Corporation. All rights reserved.

am logo
United Way Top 25 logo
Elite 50 Internship Badge
  • Home
  • News
  • Email Alerts
  • RSS
  • Legal Notices
  • Privacy Policies
  • Fraud Protection Center
  • Accessibility
  • Help
  • Site Map