While computers and the Internet offer great benefits, they also provide cyber criminals with opportunities to steal personal information. Cyber crooks have shown they can keep up with the fast-paced growth of technology. They constantly develop new tools and methods to trick and exploit people through computer and Internet use. The more aware you are of cyber threats, the more prepared you will be to avoid them.

  • Malware: a broad term for the many forms of malicious software designed to disrupt, harm, or hijack a computer system or data. It includes viruses and spyware. Secretly installed without your knowledge or consent, malware programs can damage your privacy and the security of your computer or mobile device. They can capture your personal information in a variety of ways and secretly send it to identity thieves.  Computers and mobile devices are commonly infected with malware through email attachments, downloads, and the links within emails, instant messages, or pop-up windows.
  • Phishing: When cyber thieves send you emails that try to lure you into providing or confirming personal information. The emails look like they’re from legitimate organizations, often ones you know. They ordinarily use threats, warnings, or enticements to create a sense of urgency. You’re usually asked to click on a link. If you do, it can lead to a spoof website. The site looks real enough to trick you into entering personal information.
  • Catfishing: When a person creates a fake identity on social media, usually targeting a specific victim for abuse, deception, or fraud. Catfishing is often used for romance scams on dating websites.
  • Smishing & Vishing: Very similar to phishing, this is when criminals use automated dialing systems to call or text you with messages intended to trick you into sharing personal information. The message will direct you to a phone number or website that asks you for the information.


  • Anti-Virus: Install and update anti-virus software on all devices connected to the Internet. DETAILS 4 Details NameDetails ContentParagraphTo open the popup, press Shift+EnterTo open the popup, press Shift+Enter Delete
  • Back it up: Data loss doesn’t come with a warning. Automatically back up your critical data at least once a week.
  • Delete when done: Uninstall mobile apps you no longer use.
  • Stay aware: Cybersecurity is every-changing. Stay ahead of cyber issues with ongoing education.
  • S=Secure: Look for https as part of the URL of a site you visit. It shows the authenticity of the security certificate on that webpage.
  • Keep it clean: Keep a clean machine with current security software, web browser, and operating system.
  • Look before you leave: Lock your computer before stepping away from your desk. Press the Windows key + L to quickly lock your screen.
  • Go beyond the username and password:  For an added layer of security, enable multi-factor authentication when available.
  • Lock up your password list: Replace your written list of passwords with a password management software.
  • Passwords: Make your password a sentence that is easy to remember and incorporate a special character and number. Examples – 1Love$ecurity!, [email protected]$
  • Beware of phishy emails:
    • Comes from a suspicious sender
    • Offers a prize or enticing deal
    • Contains typos and bad grammar
    • Requests you to verify or update account information, stop payments, or complete other important processes
  • Secure your devices: Use strong passwords, codes or touch ID features to lock your devices.
  • See something, say something: If you see something suspicious, report it to the proper authorities as soon as possible.
  • Think before you app: Be thoughtful about which apps you download and allow to collect your personal information.
  • Think before you click: Don’t click on any link unless you know you can trust the source and are certain of where the link will send you.
  • Don’t trust an unknow USB drive: If you find a USB drive, do not plug it in to your computer to identify the owner.
  • When in doubt, throw it out: If an email, link or post looks suspicious, delete and/or mark it as junk.
  • Be WiFi savvy: Public wireless networks and hotspots are not secure. Avoid logging in to important accounts such as email and financial services while on a public network.

The Importance of Software Updates & Patches

You’re probably no stranger to those little pop-up windows. They tell you software updates are available for your computer, laptop, tablet, or mobile device. You might be tempted to click on that “Remind me later” button. If the pop up for a software update is from a known and trusted site, don’t put off updating your software for long.   

Software updates often include software patches. They cover the security holes to keep hackers out and they can also add new features and improve existing ones.

Cybersecurity is mostly about protecting you, but you’ve got other people to think about, too. If your device gets a virus, you could pass it on to your friends, family, and co-workers. That’s why you want to keep your software and systems updated.

If you’re still not keen on clicking “Update now,” you may be able to configure your devices to update automatically. If so, your problem is solved.

Cybercrime can be particularly difficult to investigate and prosecute because it often crosses legal jurisdictions and even international boundaries.

Who to Contact

  • Contact TCB at 1-800-422-5675 and report your situation. TCB will take measures to put controls on your accounts and online banking to possibly keep you from any further loss. TCB can offer you a free referral to our ID Theft Protection company who can give you instructions on other measures you may need to take to protect your identity. 
  • Local law enforcement. Even if you have been the target of a multijurisdictional cybercrime, your local law enforcement agency has an obligation to assist you, take a formal report, and make referrals to other agencies.
  • IC3. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. Complaints may be filed online at www.ic3.gov/default.aspx.
  • Federal Trade Commission. The FTC does not resolve individual consumer complaints, but does operate the Consumer Sentinel, a database that is used by civil and criminal law enforcement authorities worldwide. File your complaint at www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en.

Platforms like Facebook, Twitter, Instagram, and LinkedIn and many others can help us connect on a personal and professional level with friends, family, business associates, and causes that allow us to make new connections with others with shared interests. And participation is free to everyone, which has led to an unprecedented use of social media.

As of April 2021, 3.96 billion people identified as users of social media, representing half of the 7.7 billion of the world's population, including more than 70% of the population of the United States. Globally, the average person spends more than 2 hours per day on social media. It is not surprising that criminals have focused their attention on these internet platforms as a way to gather personal information, gain trust, and socially engineer their way to fraud that results in billions of dollars of losses annually.

At the conclusion of this article we will focus on tips to stay safe while using social media. But first, we want to alert you to social media scams that you may not be thinking about. Being alert to potential scams is the best way to protect yourself against fraud and identity theft.


Lotteries, gift cards, and other prize scams can make you believe that just by using social media you have somehow qualified for a prize of cash, gifts or discounts. These scams are designed to lure you to click on a link, which can go on to request personal information in order to "verify your eligibility". And by clicking on links to view or redeem your prize you may also be unwittingly downloading malware that can continue to collect more personal information and track your logins and other internet activity.

Why this scam works: Everyone loves a discount, and the attraction of winning a prize is strong.

Remember: You can't win a lottery that you never entered; however, a scammer can throw up advertising to everyone that appears that it is a personal approach just to you. Be wary of anyone that you don't know asking for your personal information, especially your banking details.


We have all seen friends on social media participate in fun and interesting games such as "Are you color-blind?", "Check your IQ", and "What is your Pirate Name?". These games may ask for your age, your date of birth, marital status, zip code and other personal information such as your name of the street that you grew up on, your favorite pet's name, etc. which could be useful for a criminal to create a profile on you to commit identity theft. These scams can ask for your phone number to move further and receive results, which can quietly enroll you in services that obligate you to monthly charges.

Why this Scam Works: Most of us look for ways to interact with others and receive personalized feedback. Once a friend participates in this activity there is peer pressure for other friends to play along.

Remember: Never enter any personal information on social media, even your phone number. While many games may be harmless there are many others that are looking for ways to gather information for nefarious purposes.


This is a variation of a phishing scam that you may receive as a message in your social media app, or it may appear in your feed as an advertisement that looks like a message directed just to you. Variations of this message might be "I can't believe what he said about you!!!" or "Did you really mean to say this out loud?" Our protection instinct kicks in and you click on a link which downloads malware, and/or presents a login page that looks just like the social media site. Thinking it is legitimate you enter your user name and password. Now the criminals have your social media login which provides access to your profile and everything you have posted on the site.

Why this Scam Works: Anyone who has interacted on social media has a fear that they, or someone they know, will accidentally post something unintended. Even more compelling is the thought that someone who may want to do harm will post something embarrassing or confidential.

Remember: Don't click on links in social media. If you receive a message and you can't verify the source, don't click. If it looks like the message is from someone you know, contact that person to verify its not a scam before clicking the link. And make sure you have your social media profile settings set correctly so only your connections can message you.


In this scam, an offer may be presented to download an "Add-On" that will allow you to see who is searching for, and viewing your social media profile. The scam may redirect you to a survey or an online registration for a purchase, which allows the criminal to gain access to your personal enrollment information and your credit card data.

Why this Scam Works: We all have curiosity and a desire to be liked.

Remember: If you are redirected to a page, make sure that the URL is legitimate. Check out the product offer outside of your social media session to see if it is legitimate and their and no scam complaints.


Tell an avid social media user that a request to cancel their account has been received, or that their account is being frozen or removed, and watch the panic set in. Criminals count on this reaction. A normally careful person forgets all of the lessons of internet safety in their haste to prove that this action is NOT warranted. If this happens, it may result in you unwittingly providing information to criminals posing as social media administrators. In reality you may be giving up all types of personal information, which may include your name, address, SSN, credit card information, login information and more.

Why this Scam Works: Social media platforms are an important link to our family, friends and business associates. The thought of losing data and control of this lifeline is scary to many.

Remember: Don't trust any message that claims to be from the social media administrator. Contact the administrator outside of the social media session to make sure that the message is legitimate. And be very wary of any message on any platform that seems to rush you to action. In your haste you may make what appears to be a bad situation and even worse situation.


While it is easy to set up a social media account profile and it’s fun to connect with others, it’s important to maintain awareness. According to a report by the FTC, in 2019, total reported losses to social media frauds reached $134 million. But reported losses reached record highs, climbing to nearly $117 million in just the first six months of 2020, with no end in sight. Use this checklist to make sure that you are protecting yourself and your family on social media, on the internet, and in person.

  • Check your profile settings. Consider limiting the information that you share with the world. Some of your social media profile information might already be publicly available, but there are other details that a criminal could glean for your profile to help them patch together a clearer picture of your identity.

  • Be thoughtful about sharing personal details online. For safety’s sake, wait a few hours or even a few days before sharing content that reveals your location. A few vacation photos could be just the invitation a criminal needs to enter your home while you aren’t around. On social media, accept contact or friend requests with care. Decline friend requests from people you don’t know in real life; you never know who might actually be on the other side of your internet connection.

  • Think before you click. Hover over the hyperlink to confirm its real destination before you click on a URL. We recommend that you visit only secure websites, beginning with “https” instead of “http”.

  • Avoid phishing scams. Exercise caution when you receive a message in social media (or text, email, postal mail or by telephone) from someone you don’t know. Many criminals imitate celebrities, major corporations, financial institutions, or government agencies in an attempt to lure you into providing confidential or payment information.

  • Use public WiFi with caution. When you’re using a shared wireless network, other people on the same network may be able to see your internet traffic, which could open up your account information to unsavory characters. Avoid logging into confidential financial accounts and social media when you’re on shared WiFi. Even if you’re using your own device, try to remember to log out when you’re done.

Even when you take all the right precautions, bad things can still happen. If you or a family member suspects that your identity has been compromised, help is only a phone call away. With The Tri-County Bank ID Safe Choice you and up to three generations of your family have access to Fully Managed Identity Theft Recovery. We have professional Identity Theft Recovery Advocates standing by, ready to work on your behalf to help recover your identity and reverse any damage caused by identity theft.