How to stop internet scammers

man people woman water

Innovation’s Price

The worldwide web, or internet, came publicly accessible On August 6, 1991 by founders Vinton Cerf and Bob Kahn. The internet produced fresh technologies such as e.g. emails, websites, cloud storage, coding, smartphones, Ai (artificial intelligence) etc. Internet functionality offers advanced ideas, employment and sparked the culture for TikTok, Memes, GIFs, hyperlink sharing, selfies and social media platforms like Twitter, Facebook and Instagram.

 

However, lurking in the background of creative technology were the identity thieves, hackers and scammers. Regardless of these descriptions, cyber-stalkers prey on your sympathy and patronize victims. Although authorities and organizations strive diligently to ensure cyber-security, offenders are clever. Offenders steal, by utilizing your information or digital footprint. e.g. photos, conversations, friends…

 

When someone wants to harm you, it’s best to never go to the second location. Often these stalkers are trying to isolate you from prying eyes and inquisitive minds. e.g. “If you’re gonna kill me, kill now.” Cyber-criminals can be anyone and everywhere. They work isolated platforms like Google hangouts, WhatsApp, Viber, DMs and Skype. They attend webinars, social media groups and chat rooms to learn and find their next target.

 

Article Perks: Scams you should know about.

Play Video
Play Video

Danger ahead

    1. The Hacker: A person who operates computers to gain access to unauthorized data for manipulation.

    2. The Identity Thief: Fraud involving someone else’s identity (name, social security number, photos, background) other than their own to carry out atrocities.

    3. The Scammer: A person posing as a reputable firm to perpetrate crimes. e.g. calls to inform you your computer is broken. These scammers make phone calls, use computers and whatever they can to solicit your financial help.

 

According to FBI crime statistic reports thousands of cyber-crimes are reported daily. Merely thousands of criminals are apprehended. Millions of lives are destroyed. And millions more cases go unreported. In cases of cyber-bullying, human trafficking, money laundering and indeed romance (from dating websites), there are countless victims. Any organization exploiting this automated technology, cyber-security, is a must.

 

Cybercrime is a technological pandemic and a virus. Many people have lost retirement savings, and homes, and other victims committed suicide. Before the internet, the only communication for criminals was direct mail, prison visits and phone calls. Cyber-crime is now a universal dilemma stemming from various countries. Limiting access is the primary focus.

The Red Flags

Businesses want to make a profit, but not at the risk of losing reoccurring revenue. Businesses will not stalk you for a profit. Owners know if there’s a need, profits will come soon enough, and no price is too steep for any customer who truly wants it. Good business proprietors sell by value not by price and care about consumer needs.

 

A clear signal something is erroneous is coercing and demanding things unearned, abusive behavior as if you owe them. “Flattery is for fools”. These criminals are full of flattery, and some are charming narcissistic people. Rushing to get to know all about you within a month or out of your comfort zones. Both men and women are victims and both may be criminals, too.

 

Internet crimes happen because no one believes it could happen to them. These scams can happen to anyone, anywhere at any time. Make it problematic by securing your accounts, photos, assets, family and your very own life. You can accomplish this with 2 factor authentications. Do not save passwords in open forums. e.g. libraries. Clear out cookies, history on all public computers before logging out. Using parental controls on devices. Be weary of folks asking to use your cellphone or home computer. Change passwords frequently. These are a few ways to stop thieves in their tracks. e.g. a new neighbor’s child homework visiting, repairmen.

 

Cyber-criminals often work together. Be careful where you go and who you meet online. Meeting new people is great. Seemingly innocent questions can be the most harmful online. e.g. What’s your mom’s maiden name? Where do you live? Do you live alone? How old are you and when is your birthday? Remember, human trafficking is a billion dollar international business. Prominent hotels house victims unbeknownst to guests. Hotel staff might be aiding and abetting crimes for profit.

 

Do we need computers asking if we’re real or a robot? Do we need to solve random mathematic equations? e.g. 1 + 2= 3, or how many crosswalks in this picture?

 

We need institutions verifying if it’s really YOU! Also, needed is educating public safety concerns in schools, homes, everywhere.

 

On the “We Share” page please referr to the free movie: “iT”. Learn to protect yourself by erasing digital footprints. The password is case sensitive, so copy & paste.

 

Passcode: WESHARE-IT

 

Thank you for your time. Please share this important message with your friends and loved ones.
If you have any problems with the “We Share” movie, please reload the page. This is a limited time offer page and scheduled to shut down after all promos. 

You May Also Like:

Skip to content