Learn how to recognize fraud before you become a victim.
Fake emails Phishing fraudsters try to obtain your confidential or personal information by sending emails that look genuine but could ask you to submit details on an unsecure site.
(a) Never respond to or act upon emails from someone who you would not normally receive it, or select Web links from any unknown source that requires you to provide, update, or verify personal, financial, or other confidential information. Also be aware that a fraudster can make an email seem as if it is from a known source. (b) Be wary of any suspicious emails or phone calls asking you to validate your GLP Deliveries account information.
(c) Look out for Subject lines - with a sense of alarm e.g. 'Security Alert' or 'Your account will be suspended.' These people will try to illicit panic and urgency from you in a hope to make you act quickly without your normal cautious nature.
(d) Requests for information - GLP Deliveries will never email asking you for payments, personal information, financial information, account numbers, IDs, passwords, or copies of invoices in an unsolicited manner.
(e) Top Tip! When viewing an email, you can hover over hyperlinks (or buttons) to see the underlying website address (URL).
(f) Design flaws - an email containing distorted or irregularly sized logos.
(g) Poor grammar - Grammatical errors and excessive use of exclamation points.
(h) Misspellings - incorrectly spelled words or links to altered websites (For example, modifications or variations of the legitimate www.glpdeliveries.co.uk website address). Sense of urgency - alarming messages requesting immediate action, such as "Your account will be suspended within 24 hours." or "Contact us immediately to claim your parcel or prize."
Use a secure Internet browser.
Do not give out your ID or password.
Create strong passwords by using a combination of letters and numbers.
Change your password regularly, at least every three months.
Always use up-to-date virus protection software and consider using spyware detection programs.
Equip your computer with either a software or hardware firewall.
Do not access confidential information at Internet cafes, public libraries, etc.
If you are using a wireless device, be sure to follow the manufacturer's instructions on establishing the services and settings to ensure a protective level of security.
Try to avoid ransomware by:
(a) Regularly back up all your data, including to a USB-connected device stored remotely from your computer. This is because some ransomware can also infect your cloud-based storage. (b) Visit only websites you know to be reputable.
If you are ever unsure of the validity of a communication, hang up the phone and a call-back using a phone number you've got from a trusted website or your statement and never the one that called you originally.
By being aware and taking your time to make right decision about where and with whom you are sharing your sensitive information is the best way of avoiding the fraud.