1. Contact Us
  2. Find an Agency
  3. To Cinfin.com
  4. Careers

The Cincinnati Insurance Companies

logo for printing

Subscribe to our blog

[jetpack_subscription_form]

Navigation
  • Blog Home
  • About Us
  • Contributors
  • Guidelines
  • Prepare
    • Distracted Driving
    • Earthquakes
    • Hurricanes
    • Storms
    • Wildfires
    • Winter

Knowledge is power in protecting yourself from fraud

By Cincinnati Compliance & Ethics Program

fraud-phishing

.Learn how to protect yourself from internet crime schemes.

 

While you work hard to earn money, criminal enterprises are working hard to steal it. So let’s take a minute to brush up on the latest tricks, scams and methods criminals are using to steal data and money from you and your customers.

Internet fraud is the use of internet services – or software with internet access – to defraud victims or to otherwise take advantage of them. Internet crime schemes steal millions of dollars each year from victims and continue to plague the internet through various methods. Several high-profile methods include:

  • Business Email Compromise (BEC): This sophisticated scam targets businesses working with foreign suppliers and companies that regularly perform wire transfer payments. Criminals compromise legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds. Social engineering is a method of first gaining trust to manipulate a victim into divulging personal or confidential information.
  • Data Breach: A leak or spill of data is released from a secure location to an untrusted environment. Data breaches can occur at the personal and corporate levels and involve sensitive, protected or confidential information that unauthorized individuals copy, transmit, view, steal or use.
  • Denial of Service: An authorized user’s access to any system or network is interrupted, typically with malicious intent.
  • Email Account Compromise (EAC): Similar to BEC, this scam targets the general public and professionals associated with — but not limited to — financial and lending institutions, real estate companies and law firms. Perpetrators of EAC use compromised emails to request payments to fraudulent locations.
  • Malware/Scareware: Malicious software is introduced with the intention to damage or disable computers and computer systems. Sometimes perpetrators use scare tactics to solicit funds from victims.
  • Phishing/Spoofing: Both terms deal with forged or faked electronic documents. Spoofing generally refers to the dissemination of email that is forged to appear as though it was sent by someone other than the actual source. Phishing – often used in conjunction with a spoofed email – sends an email falsely claiming to be an established legitimate business with the intent to deceive the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers and bank account information. The email directs the user to visit a fake website set up only as an attempt to steal the user’s information. Vishing is a variation of the scam using voice messaging; smishing uses SMS text messaging; and pharming uses fraudulent websites. Spear phishing attacks target specific individuals and use emails that appear to come from a trusted sender.
  • Ransomware: This form of malware targets both human and technical weaknesses in organizations and individual networks to deny the availability of critical data or systems. Ransomware is frequently delivered through spear phishing emails to recipients, resulting in the rapid encryption of sensitive files on a corporate network. When the victim organization determines they are no longer able to access their data, the cyber perpetrator demands the payment of a ransom, typically in virtual currency such as Bitcoin, at which time the actor purportedly will provide an avenue to the victim to regain access to their data.

Frequent instances of internet fraud include business fraud, credit card fraud, internet auction fraud, investment schemes, Nigerian letter fraud and non-delivery of merchandise. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center (IC3), a partnership of the FBI and the National White Collar Crime Center. Also see the FBI’s information on Common Scams and Crimes.

 

This loss control information is advisory only. The author assumes no responsibility for management or control of loss control activities. Not all exposures are identified in this article. Neither The Cincinnati Insurance Company nor its affiliates or representatives offer legal advice. Consult with your attorney about your specific situation. Contact your local, independent insurance agent for coverage advice and policy service.


Share This Blog:

Share This Blog:


 

Comments are closed.

Find an Agency

  1. Advanced Search
  2. Our Agents
Claims Quote

CATEGORY TOPICS

  • Business Insurance
    • Contractor
    • Craft Beverage
    • Educational Institutions
    • Fitness & Recreation
    • Health Care Facilities
    • Hospitality
    • Machinery & Equipment
    • Social Services
  • Catastrophe
    • Earthquake
    • Flood
    • Hurricane
    • Spring Storms
    • Wildfire
  • Consumer Tips
    • Autumn Prep
    • Storm Prep
    • Winter Prep
  • Life Insurance
    • Business Life
  • Lifestyle
  • Pandemic
  • Personal Insurance
    • Capstone
    • Home Construction
    • Home Maintenance
    • Home Protection-Fire
    • Home Protection-Safety
    • Home Protection-Water
    • Risk Management
    • Valuable Articles
    • Valuation
  • Safety Tips
    • Distracted Driving
    • Fire Prevention
    • Loss Control

Subsidiaries of Cincinnati Financial Corporation

  • Youtube Icon
  • Blog Icon
  • Facebook Icon
  • Instagram Icon
  • Linkedin Icon
  • Businesses
  • Individuals
  • Claims
  • Agents
  • Investors
  • About
  • Careers

For information, quotes or coverage availability, please contact your local independent agent representing Cincinnati Insurance. For policy service, please contact your local independent agent or send us an email. Property and casualty coverages may be provided by The Cincinnati Insurance Company or one of its wholly owned subsidiaries, The Cincinnati Indemnity Company, The Cincinnati Casualty Company or The Cincinnati Specialty Underwriters Insurance Company. The Cincinnati Life Insurance Company provides life insurance and fixed annuities. Each insurer has sole financial responsibility for its own products. Not all subsidiaries operate in all states. Location: 6200 S. Gilmore Road, Fairfield, OH 45014-5141 Mailing address: P.O. Box 145496, Cincinnati, OH 45250-5496. Copyright © 2023 Cincinnati Financial Corporation. All rights reserved.

am logo
United Way Top 25 logo
Elite 50 Internship Badge
  • Home
  • News
  • Email Alerts
  • RSS
  • Legal Notices
  • Privacy Policies
  • Fraud Protection Center
  • Accessibility
  • Help
  • Site Map