{"id":21162,"date":"2024-03-04T12:04:24","date_gmt":"2024-03-04T17:04:24","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=21162"},"modified":"2024-05-29T13:55:19","modified_gmt":"2024-05-29T17:55:19","slug":"malware-phishing-and-4-red-flags-to-avoid-them","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/es\/malware-phishing-and-4-red-flags-to-avoid-them\/","title":{"rendered":"Mes de la prevenci\u00f3n del fraude: 4 consejos para evitar el malware y el phishing"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91, .wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91[data-kb-block=\"kb-adv-heading21162_b111fe-91\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91[data-kb-block=\"kb-adv-heading21162_b111fe-91\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_b111fe-91[data-kb-block=\"kb-adv-heading21162_b111fe-91\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_b111fe-91 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_b111fe-91\">a win in the fight against malware &#8211; A cause for celebration this Fraud Prevention Month<\/h2>\n\n\n<style>.kadence-column21162_d9860b-04 > .kt-inside-inner-col,.kadence-column21162_d9860b-04 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_d9860b-04 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_d9860b-04 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_d9860b-04 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_d9860b-04 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_d9860b-04{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_d9860b-04 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_d9860b-04 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_d9860b-04\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba, .wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba[data-kb-block=\"kb-adv-heading21162_a3ccff-ba\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba[data-kb-block=\"kb-adv-heading21162_a3ccff-ba\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_a3ccff-ba[data-kb-block=\"kb-adv-heading21162_a3ccff-ba\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_a3ccff-ba wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_a3ccff-ba\">Fraud Prevention Month (FPM) is an annual awareness campaign occurring in March designed to help people recognize, reject, and report fraud. Empowering individuals through awareness, FPM aims to create a society better equipped to identify and thwart fraudulent schemes, ensuring a safer and more secure world for everyone.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b, .wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b[data-kb-block=\"kb-adv-heading21162_a81bc5-8b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b[data-kb-block=\"kb-adv-heading21162_a81bc5-8b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_a81bc5-8b[data-kb-block=\"kb-adv-heading21162_a81bc5-8b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_a81bc5-8b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_a81bc5-8b\">The LockBit Ransomware Group Takeover<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68, .wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68[data-kb-block=\"kb-adv-heading21162_fea492-68\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68[data-kb-block=\"kb-adv-heading21162_fea492-68\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_fea492-68[data-kb-block=\"kb-adv-heading21162_fea492-68\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_fea492-68 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_fea492-68\">Lockbit, a notorious cybercriminal group responsible for almost 1 out of 4 ransomware attacks in Canada in 2022, including the February 2022 Indigo attack and the 2022 SickKids data breach recently had their website taken under the control of law enforcement as part of \u2018Operation Cronos.\u2019 Led by the UK in collaboration with the FBI and a number of countries including Canada, this cross-border jurisdictional collaboration is the first of its kind. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-1024x574.png\" alt=\"The LockBit website belonging to cybercriminals responsible for malware attacks under control of law enforcement\" class=\"wp-image-21166\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-1024x574.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-600x336.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-300x168.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-768x431.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-1536x861.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-2048x1148.png 2048w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/lockbit-under-control-of-law-enforcement-18x10.png 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The LockBit website, which lives on the dark web, showcases a splash screen indicating that the website is currently under control of law enforcement.<\/figcaption><\/figure>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7, .wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7[data-kb-block=\"kb-adv-heading21162_564dc1-f7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7[data-kb-block=\"kb-adv-heading21162_564dc1-f7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_564dc1-f7[data-kb-block=\"kb-adv-heading21162_564dc1-f7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_564dc1-f7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_564dc1-f7\">What makes \u2018Operation Cronos\u2019 so significant? <\/h4>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91, .wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91[data-kb-block=\"kb-adv-heading21162_ed390f-91\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91[data-kb-block=\"kb-adv-heading21162_ed390f-91\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_ed390f-91[data-kb-block=\"kb-adv-heading21162_ed390f-91\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_ed390f-91 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_ed390f-91\">In the past, we have seen cybercrime groups cut off the internet entirely when brought to justice, with their sites disappearing. The problem with this approach is that the victims data being held ransom by these groups disappeared also.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac, .wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac[data-kb-block=\"kb-adv-heading21162_2e9e00-ac\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac[data-kb-block=\"kb-adv-heading21162_2e9e00-ac\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_2e9e00-ac[data-kb-block=\"kb-adv-heading21162_2e9e00-ac\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_2e9e00-ac wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_2e9e00-ac\">This new approach of taking control over the ransomware group\u2019s website allows law enforcement to publish decryption keys that victims must use in order to regain control of their information.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<style>.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col,.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_8ba5a1-24{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_8ba5a1-24 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_8ba5a1-24\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4, .wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4[data-kb-block=\"kb-adv-heading21162_f49661-c4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4[data-kb-block=\"kb-adv-heading21162_f49661-c4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_f49661-c4[data-kb-block=\"kb-adv-heading21162_f49661-c4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_f49661-c4 wp-embed-aspect-16-9 wp-has-aspect-ratio wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_f49661-c4\">Don&#8217;t miss our Interview with CTV News<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42, .wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42[data-kb-block=\"kb-adv-heading21162_4f62d3-42\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42[data-kb-block=\"kb-adv-heading21162_4f62d3-42\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_4f62d3-42[data-kb-block=\"kb-adv-heading21162_4f62d3-42\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_4f62d3-42 wp-embed-aspect-16-9 wp-has-aspect-ratio wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_4f62d3-42\">Our very own Claudiu Popa joins CTV\u2019s Michelle Dub\u00e9 to discuss \u2018Operation Cronos.\u2019 Don\u2019t miss the informative interview where he explains how \u2018ransomware as a service\u2019 businesses work, discusses the significance of this unprecedented approach by law enforcement, and so much more.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Claudiu Popa interviewed by CTV Regarding the LockBit Ransomware Group Takedown by Law Enforcement\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/Ca8TKoXtcOM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_f8bb6c-41 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_f8bb6c-41 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_f8bb6c-41\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kadence-column21162_d03dd5-ac > .kt-inside-inner-col,.kadence-column21162_d03dd5-ac > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_d03dd5-ac > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_d03dd5-ac > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_d03dd5-ac > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_d03dd5-ac > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_d03dd5-ac{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_d03dd5-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_d03dd5-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_d03dd5-ac\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b, .wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b[data-kb-block=\"kb-adv-heading21162_2af981-1b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b[data-kb-block=\"kb-adv-heading21162_2af981-1b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_2af981-1b[data-kb-block=\"kb-adv-heading21162_2af981-1b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_2af981-1b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_2af981-1b\">What is Malware?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0, .wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0[data-kb-block=\"kb-adv-heading21162_b79298-a0\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0[data-kb-block=\"kb-adv-heading21162_b79298-a0\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_b79298-a0[data-kb-block=\"kb-adv-heading21162_b79298-a0\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_b79298-a0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_b79298-a0\">Short for <em>\u2018malicious software\u2019<\/em>, Malware is a type of software designed to cause damage and gain unauthorized access to a device or system without the user\u2019s knowledge of consent. <\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0, .wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0[data-kb-block=\"kb-adv-heading21162_b3d07f-c0\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0[data-kb-block=\"kb-adv-heading21162_b3d07f-c0\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_b3d07f-c0[data-kb-block=\"kb-adv-heading21162_b3d07f-c0\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_b3d07f-c0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_b3d07f-c0\">There are many types of malware, including:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware <\/strong>that locks up your files unless you pay to have them returned<\/li>\n\n\n\n<li><strong>Spyware <\/strong>that steals your personal information<\/li>\n\n\n\n<li><strong>Key loggers<\/strong> that record everything you type including your passwords<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e, .wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e[data-kb-block=\"kb-adv-heading21162_85b154-0e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e[data-kb-block=\"kb-adv-heading21162_85b154-0e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_85b154-0e[data-kb-block=\"kb-adv-heading21162_85b154-0e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_85b154-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_85b154-0e\">How does malware get on my devices?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf, .wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf[data-kb-block=\"kb-adv-heading21162_232694-bf\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf[data-kb-block=\"kb-adv-heading21162_232694-bf\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_232694-bf[data-kb-block=\"kb-adv-heading21162_232694-bf\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_232694-bf wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_232694-bf\">Most malware gets to your device through <strong><em>phishing<\/em><\/strong>, often through email attachments. <\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69, .wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69[data-kb-block=\"kb-adv-heading21162_103d79-69\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69[data-kb-block=\"kb-adv-heading21162_103d79-69\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_103d79-69[data-kb-block=\"kb-adv-heading21162_103d79-69\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_103d79-69 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_103d79-69\"><strong><em>Phishing <\/em><\/strong>is a type of scam that is designed to trick you into providing personal information, passwords, money, or to install malware on your device. Phishing scams appear in email, text, and social media, with fraudsters impersonating legitimate people or companies in hopes of tricking you into providing your information.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86, .wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86[data-kb-block=\"kb-adv-heading21162_b19427-86\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86[data-kb-block=\"kb-adv-heading21162_b19427-86\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_b19427-86[data-kb-block=\"kb-adv-heading21162_b19427-86\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_b19427-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_b19427-86\">80% of malware infections are achieved through phishing attempts <sup data-fn=\"e6e9a906-fad5-47bd-b66a-2cf80389ec26\" class=\"fn\"><a href=\"#e6e9a906-fad5-47bd-b66a-2cf80389ec26\" id=\"e6e9a906-fad5-47bd-b66a-2cf80389ec26-link\">1<\/a><\/sup><\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89, .wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89[data-kb-block=\"kb-adv-heading21162_09673c-89\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89[data-kb-block=\"kb-adv-heading21162_09673c-89\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_09673c-89[data-kb-block=\"kb-adv-heading21162_09673c-89\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_09673c-89 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_09673c-89\">more than 90% of all cyber attacks begin with phishing<sup data-fn=\"fe90b759-b49c-4774-8338-92e8443dcaab\" class=\"fn\"><a href=\"#fe90b759-b49c-4774-8338-92e8443dcaab\" id=\"fe90b759-b49c-4774-8338-92e8443dcaab-link\">2<\/a><\/sup><\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d, .wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d[data-kb-block=\"kb-adv-heading21162_e35c74-4d\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d[data-kb-block=\"kb-adv-heading21162_e35c74-4d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_e35c74-4d[data-kb-block=\"kb-adv-heading21162_e35c74-4d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_e35c74-4d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_e35c74-4d\">46% of hackers spreading malware deliver it almost exclusively through email.<sup data-fn=\"130592a3-fdf2-4395-9631-793f60594a65\" class=\"fn\"><a href=\"#130592a3-fdf2-4395-9631-793f60594a65\" id=\"130592a3-fdf2-4395-9631-793f60594a65-link\">3<\/a><\/sup><\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7, .wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7[data-kb-block=\"kb-adv-heading21162_b4dde2-a7\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7[data-kb-block=\"kb-adv-heading21162_b4dde2-a7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_b4dde2-a7[data-kb-block=\"kb-adv-heading21162_b4dde2-a7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_b4dde2-a7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_b4dde2-a7\">93% of phishing emails contain malware.<sup data-fn=\"219dfbdc-e380-484c-b412-c61543d2dffa\" class=\"fn\"><a href=\"#219dfbdc-e380-484c-b412-c61543d2dffa\" id=\"219dfbdc-e380-484c-b412-c61543d2dffa-link\">4<\/a><\/sup><\/h6>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_87533c-2e .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_87533c-2e .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_87533c-2e\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kadence-column21162_46b679-e5 > .kt-inside-inner-col,.kadence-column21162_46b679-e5 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_46b679-e5 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_46b679-e5 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_46b679-e5 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_46b679-e5 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_46b679-e5{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_46b679-e5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_46b679-e5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_46b679-e5\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55, .wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55[data-kb-block=\"kb-adv-heading21162_018460-55\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55[data-kb-block=\"kb-adv-heading21162_018460-55\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_018460-55[data-kb-block=\"kb-adv-heading21162_018460-55\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_018460-55 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_018460-55\">How Do I Spot a Phishing scam?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4, .wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4[data-kb-block=\"kb-adv-heading21162_6d7b86-a4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4[data-kb-block=\"kb-adv-heading21162_6d7b86-a4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_6d7b86-a4[data-kb-block=\"kb-adv-heading21162_6d7b86-a4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_6d7b86-a4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_6d7b86-a4\">Be suspicious of all attachments and links in emails and messages. Remember, <strong>there are no safe files types!<\/strong> Any link or attachment may contain malware including photos, videos, PDFs, and more. Clicking on these links or file attachments can initiate the installation of malware onto your device.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49, .wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49[data-kb-block=\"kb-adv-heading21162_0e64ff-49\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49[data-kb-block=\"kb-adv-heading21162_0e64ff-49\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_0e64ff-49[data-kb-block=\"kb-adv-heading21162_0e64ff-49\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_0e64ff-49 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_0e64ff-49\">54% of phishing emails contain malware.<sup data-fn=\"88e43e84-f33a-4e57-84bb-1d83c42f7b05\" class=\"fn\"><a href=\"#88e43e84-f33a-4e57-84bb-1d83c42f7b05\" id=\"88e43e84-f33a-4e57-84bb-1d83c42f7b05-link\">5<\/a><\/sup><\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf, .wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf[data-kb-block=\"kb-adv-heading21162_a08645-bf\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf[data-kb-block=\"kb-adv-heading21162_a08645-bf\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_a08645-bf[data-kb-block=\"kb-adv-heading21162_a08645-bf\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_a08645-bf wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_a08645-bf\">Over 3.4 billion phishing emails are sent daily.<sup data-fn=\"f1f7793f-ae78-4ae5-9bf9-633248b1a2ef\" class=\"fn\"><a href=\"#f1f7793f-ae78-4ae5-9bf9-633248b1a2ef\" id=\"f1f7793f-ae78-4ae5-9bf9-633248b1a2ef-link\">6<\/a><\/sup><\/h6>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_6305f2-66 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_6305f2-66 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_6305f2-66\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b, .wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b[data-kb-block=\"kb-adv-heading21162_96a492-5b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b[data-kb-block=\"kb-adv-heading21162_96a492-5b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_96a492-5b[data-kb-block=\"kb-adv-heading21162_96a492-5b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_96a492-5b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_96a492-5b\">View, download, print, and share our &#8216;What is Phishing&#8217; Resource<\/h4>\n\n\n<a class=\"wp-block-read-more\" href=\"https:\/\/knowledgeflow.org\/es\/malware-phishing-and-4-red-flags-to-avoid-them\/\" target=\"_blank\">https:\/\/knowledgeflow.org\/resource\/what-is-phishing\/<span class=\"screen-reader-text\">: Fraud Prevention Month: 4 Tips to Avoid Malware and Phishing<\/span><\/a>\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-knowledgeflow-cybersafety-foundation wp-block-embed-knowledgeflow-cybersafety-foundation\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"UKFr5Et0TU\"><a href=\"https:\/\/knowledgeflow.org\/resource\/what-is-phishing\/\">Scammer trick: Phishing &#8211; How to Spot It and Stop It<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Scammer trick: Phishing &#8211; How to Spot It and Stop It&#8221; &#8212; KnowledgeFlow Cybersafety Foundation\" src=\"https:\/\/knowledgeflow.org\/resource\/what-is-phishing\/embed\/#?secret=sDaVG9O3Ii#?secret=UKFr5Et0TU\" data-secret=\"UKFr5Et0TU\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_37eb6d-ce .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_37eb6d-ce .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_37eb6d-ce\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col,.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_7e14e0-c5{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_7e14e0-c5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_7e14e0-c5\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86, .wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86[data-kb-block=\"kb-adv-heading21162_ba8819-86\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86[data-kb-block=\"kb-adv-heading21162_ba8819-86\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_ba8819-86[data-kb-block=\"kb-adv-heading21162_ba8819-86\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_ba8819-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_ba8819-86\">Scam Red Flags<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d, .wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d[data-kb-block=\"kb-adv-heading21162_a91735-1d\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d[data-kb-block=\"kb-adv-heading21162_a91735-1d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_a91735-1d[data-kb-block=\"kb-adv-heading21162_a91735-1d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_a91735-1d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_a91735-1d\">No matter how sophisticated scams become, the following red flags are hallmarks of all online scams. fraudsters always use classic scam red flags that you can learn to recognize.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1, .wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1[data-kb-block=\"kb-adv-heading21162_73dfec-d1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1[data-kb-block=\"kb-adv-heading21162_73dfec-d1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_73dfec-d1[data-kb-block=\"kb-adv-heading21162_73dfec-d1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_73dfec-d1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_73dfec-d1\">Fear, urgency, secrecy<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scammers use fear, urgency and secrecy to deceive you. They provide a scenario that is urgent, instilling fear in you and try to convince you that you shouldn\u2019t tell anyone else.<\/li>\n\n\n\n<li>Scammers are relying on their victims to react in fear, responding quickly. Stay calm and be suspicious. Take a step back and reach out to a friend or family member for support.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5, .wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5[data-kb-block=\"kb-adv-heading21162_7a0f7e-b5\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5[data-kb-block=\"kb-adv-heading21162_7a0f7e-b5\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_7a0f7e-b5[data-kb-block=\"kb-adv-heading21162_7a0f7e-b5\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_7a0f7e-b5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_7a0f7e-b5\">Authority or legitimacy<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fraudsters impersonate legitimate organizations and people using fake identification and badge numbers to gain your trust. Legitimate logos, department names and images are often used to try to appear legitimate.<\/li>\n\n\n\n<li>Government, law enforcement, and legitimate businesses will not threaten you. Contact the supposed authority using the contact information on official invoices or forms.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b, .wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b[data-kb-block=\"kb-adv-heading21162_987e4f-4b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b[data-kb-block=\"kb-adv-heading21162_987e4f-4b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_987e4f-4b[data-kb-block=\"kb-adv-heading21162_987e4f-4b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_987e4f-4b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_987e4f-4b\">Payment (in any form)<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scammers will request payment in many forms including cash, e-transfer, credit and gift cards, cryptocurrency, and more.<\/li>\n\n\n\n<li>Legitimate businesses will never accept gift cards as payment.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8, .wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8[data-kb-block=\"kb-adv-heading21162_1cbe17-c8\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8[data-kb-block=\"kb-adv-heading21162_1cbe17-c8\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_1cbe17-c8[data-kb-block=\"kb-adv-heading21162_1cbe17-c8\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h4 class=\"kt-adv-heading21162_1cbe17-c8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_1cbe17-c8\">Personal Information<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scammers will attempt to obtain your personal information by requesting specific account numbers or addresses, often asking you to \u2018confirm\u2019 account or banking numbers to \u2018receive payments\u2019 or \u2018dispute charges.\u2019<\/li>\n\n\n\n<li>Stay skeptical and do not provide any information.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5, .wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5[data-kb-block=\"kb-adv-heading21162_78dfe3-d5\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5[data-kb-block=\"kb-adv-heading21162_78dfe3-d5\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_78dfe3-d5[data-kb-block=\"kb-adv-heading21162_78dfe3-d5\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_78dfe3-d5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_78dfe3-d5\">Staying calm, taking a step back, and being skeptical are your best defence against online scams of all kinds.<\/p>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_f5f8a8-9d .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_f5f8a8-9d .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_f5f8a8-9d\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kadence-column21162_18739f-e1 > .kt-inside-inner-col,.kadence-column21162_18739f-e1 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_18739f-e1 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_18739f-e1 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_18739f-e1 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_18739f-e1 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_18739f-e1{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_18739f-e1 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_18739f-e1 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_18739f-e1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36, .wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36[data-kb-block=\"kb-adv-heading21162_6071ab-36\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36[data-kb-block=\"kb-adv-heading21162_6071ab-36\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_6071ab-36[data-kb-block=\"kb-adv-heading21162_6071ab-36\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_6071ab-36 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_6071ab-36\">How Do I Know if I\u2019ve been infected with Malware?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22, .wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22[data-kb-block=\"kb-adv-heading21162_403811-22\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22[data-kb-block=\"kb-adv-heading21162_403811-22\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_403811-22[data-kb-block=\"kb-adv-heading21162_403811-22\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_403811-22 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_403811-22\">Malware is constantly evolving and becoming more sophisticated, making it difficult to detect. Running anti-virus and ad-blocker software will help prevent infection in the first place and remove malware if it does get downloaded. Updates are often created in response to newly detected vulnerabilities. Keep your devices protected by downloading system updates as soon as they become available.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65, .wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65[data-kb-block=\"kb-adv-heading21162_28b50e-65\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65[data-kb-block=\"kb-adv-heading21162_28b50e-65\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_28b50e-65[data-kb-block=\"kb-adv-heading21162_28b50e-65\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading21162_28b50e-65 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_28b50e-65\">Signs of Malware Infection<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your phone\u2019s battery lasts only a few minutes.<\/li>\n\n\n\n<li>Your laptop or tablet is being bombarded with popups.<\/li>\n\n\n\n<li>Your computer slows to a crawl.<\/li>\n\n\n\n<li>Your contacts receive odd emails supposedly from you.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_79eafa-2d .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_79eafa-2d .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_79eafa-2d\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kadence-column21162_472acd-d2 > .kt-inside-inner-col,.kadence-column21162_472acd-d2 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column21162_472acd-d2 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column21162_472acd-d2 > .kt-inside-inner-col{flex-direction:column;}.kadence-column21162_472acd-d2 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column21162_472acd-d2 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column21162_472acd-d2{position:relative;}@media all and (max-width: 1024px){.kadence-column21162_472acd-d2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column21162_472acd-d2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column21162_472acd-d2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07, .wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07[data-kb-block=\"kb-adv-heading21162_70f0b0-07\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07[data-kb-block=\"kb-adv-heading21162_70f0b0-07\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_70f0b0-07[data-kb-block=\"kb-adv-heading21162_70f0b0-07\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_70f0b0-07 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_70f0b0-07\">The SAFE Scan<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c, .wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c[data-kb-block=\"kb-adv-heading21162_1e0ad5-9c\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c[data-kb-block=\"kb-adv-heading21162_1e0ad5-9c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_1e0ad5-9c[data-kb-block=\"kb-adv-heading21162_1e0ad5-9c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_1e0ad5-9c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_1e0ad5-9c\">View, download, print, and share our handy safe scan resource to protect yourself against phishing attacks, malware, and other online scams.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-knowledgeflow-cybersafety-foundation wp-block-embed-knowledgeflow-cybersafety-foundation\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"ucfSqo2b7U\"><a href=\"https:\/\/knowledgeflow.org\/resource\/the-safe-scan\/\">The SAFE Scan<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The SAFE Scan&#8221; &#8212; KnowledgeFlow Cybersafety Foundation\" src=\"https:\/\/knowledgeflow.org\/resource\/the-safe-scan\/embed\/#?secret=0RKQPWDvp9#?secret=ucfSqo2b7U\" data-secret=\"ucfSqo2b7U\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_83d549-eb .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_83d549-eb .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_83d549-eb\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49, .wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49[data-kb-block=\"kb-adv-heading21162_aff754-49\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49[data-kb-block=\"kb-adv-heading21162_aff754-49\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_aff754-49[data-kb-block=\"kb-adv-heading21162_aff754-49\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading21162_aff754-49 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_aff754-49\">Project KnowledgeShare<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b, .wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b[data-kb-block=\"kb-adv-heading21162_645f13-7b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b[data-kb-block=\"kb-adv-heading21162_645f13-7b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_645f13-7b[data-kb-block=\"kb-adv-heading21162_645f13-7b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_645f13-7b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_645f13-7b\">Project KnowledgeShare, a project partnership between Durham Regional Police, Town of Ajax, Victim Services of Durham Region, and KnowledgeFlow Cybersafety Foundation is combatting cybercrime through collaboration. Funded in part by Ontario&#8217;s Safer and Vital Communities Grant, the project helps empower the most vulnerable members of our society to fight back against cybercrime. <\/p>\n\n\n<style>.kb-image21162_25be13-73 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image21162_25be13-73 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"269\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-1024x269.png\" alt=\"Preventing cybercrime through community collaboration\" class=\"kb-img wp-image-21182\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-1024x269.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-600x158.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-300x79.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-768x202.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image-18x5.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/knowledgeshare-banner-fpm2024-blog-image.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_e2580e-83 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_e2580e-83 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_e2580e-83\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96, .wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96[data-kb-block=\"kb-adv-heading21162_514ba7-96\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96[data-kb-block=\"kb-adv-heading21162_514ba7-96\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_514ba7-96[data-kb-block=\"kb-adv-heading21162_514ba7-96\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading21162_514ba7-96 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_514ba7-96\"><strong>Join the conversation and stay informed using hashtag #FPM2024 on social media<\/strong>.<\/h5>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85, .wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85[data-kb-block=\"kb-adv-heading21162_7d6ad5-85\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85[data-kb-block=\"kb-adv-heading21162_7d6ad5-85\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_7d6ad5-85[data-kb-block=\"kb-adv-heading21162_7d6ad5-85\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_7d6ad5-85 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_7d6ad5-85\"><strong>Explore Fraud Prevention Month 2024 with Canada&#8217;s Competition Bureau<\/strong><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01, .wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01[data-kb-block=\"kb-adv-heading21162_c1a7f6-01\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01[data-kb-block=\"kb-adv-heading21162_c1a7f6-01\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_c1a7f6-01[data-kb-block=\"kb-adv-heading21162_c1a7f6-01\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading21162_c1a7f6-01 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_c1a7f6-01\"><a href=\"https:\/\/ised-isde.canada.ca\/site\/competition-bureau-canada\/en\/fraud-and-scams\/fraud-prevention-month\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ised-isde.canada.ca\/site\/competition-bureau-canada\/en\/fraud-and-scams\/fraud-prevention-month<\/a><\/p>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-21162_db90fb-10 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-21162_db90fb-10 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-21162_db90fb-10\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9, .wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9[data-kb-block=\"kb-adv-heading21162_ceba53-a9\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9[data-kb-block=\"kb-adv-heading21162_ceba53-a9\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading21162_ceba53-a9[data-kb-block=\"kb-adv-heading21162_ceba53-a9\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading21162_ceba53-a9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading21162_ceba53-a9\">Sources<\/h6>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"e6e9a906-fad5-47bd-b66a-2cf80389ec26\"><a href=\"https:\/\/dataprot.net\/statistics\/hacking-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/dataprot.net\/statistics\/hacking-statistics\/<br><\/a> <a href=\"#e6e9a906-fad5-47bd-b66a-2cf80389ec26-link\" aria-label=\"Saltar a la referencia de la nota 1\">\u21a9\ufe0e<\/a><\/li><li id=\"fe90b759-b49c-4774-8338-92e8443dcaab\"><a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.cisa.gov\/stopransomware\/general-information#:~:text=Fend%20Off%20Phishing%20%3A%20Learn%20how,to%20better%20recognize%20phishing%20emails<\/a> <a href=\"#fe90b759-b49c-4774-8338-92e8443dcaab-link\" aria-label=\"Saltar a la referencia de la nota 2\">\u21a9\ufe0e<\/a><\/li><li id=\"130592a3-fdf2-4395-9631-793f60594a65\"><a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/<\/a> <a href=\"#130592a3-fdf2-4395-9631-793f60594a65-link\" aria-label=\"Saltar a la referencia de la nota 3\">\u21a9\ufe0e<\/a><\/li><li id=\"219dfbdc-e380-484c-b412-c61543d2dffa\"><a href=\"https:\/\/www.businesswire.com\/news\/home\/20160606005677\/en\/PhishMe%C2%A0Q1-2016-Sees-93-of-Phishing-Emails-Contain-Ransomware\" target=\"_blank\" rel=\"noopener\">https:\/\/www.businesswire.com\/news\/home\/20160606005677\/en\/PhishMe%C2%A0Q1-2016-Sees-93-of-Phishing-Emails-Contain-Ransomware<\/a> <a href=\"#219dfbdc-e380-484c-b412-c61543d2dffa-link\" aria-label=\"Saltar a la referencia de la nota 4\">\u21a9\ufe0e<\/a><\/li><li id=\"88e43e84-f33a-4e57-84bb-1d83c42f7b05\"><a href=\"https:\/\/www.statista.com\/statistics\/700965\/leading-cause-of-ransomware-infection\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.statista.com\/statistics\/700965\/leading-cause-of-ransomware-infection\/<\/a> <a href=\"#88e43e84-f33a-4e57-84bb-1d83c42f7b05-link\" aria-label=\"Saltar a la referencia de la nota 5\">\u21a9\ufe0e<\/a><\/li><li id=\"f1f7793f-ae78-4ae5-9bf9-633248b1a2ef\"><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/phishing-attack-statistics\/\" target=\"_blank\" rel=\"noopener\">81 Phishing Attack Statistics 2024: The Ultimate Insight (getastra.com)<\/a> <a href=\"#f1f7793f-ae78-4ae5-9bf9-633248b1a2ef-link\" aria-label=\"Saltar a la referencia de la nota 6\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>El Mes de la Prevenci\u00f3n del Fraude (MPF), que se celebra en marzo, es una campa\u00f1a vital que anima a las personas a reconocer, rechazar y denunciar el fraude. Las recientes medidas en\u00e9rgicas, como la \"Operaci\u00f3n Cronos\" contra el grupo de ciberdelincuentes Lockbit, subrayan la importancia de este tipo de iniciativas.<\/p>","protected":false},"author":8,"featured_media":21180,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"[{\"content\":\"<a href=\\\"https:\/\/dataprot.net\/statistics\/hacking-statistics\/\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener nofollow\\\">https:\/\/dataprot.net\/statistics\/hacking-statistics\/<br><\/a>\",\"id\":\"e6e9a906-fad5-47bd-b66a-2cf80389ec26\"},{\"content\":\"<a href=\\\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener nofollow\\\">https:\/\/www.cisa.gov\/stopransomware\/general-information#:~:text=Fend%20Off%20Phishing%20%3A%20Learn%20how,to%20better%20recognize%20phishing%20emails<\/a>\",\"id\":\"fe90b759-b49c-4774-8338-92e8443dcaab\"},{\"content\":\"<a href=\\\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener nofollow\\\">https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/<\/a>\",\"id\":\"130592a3-fdf2-4395-9631-793f60594a65\"},{\"content\":\"<a href=\\\"https:\/\/www.businesswire.com\/news\/home\/20160606005677\/en\/PhishMe%C2%A0Q1-2016-Sees-93-of-Phishing-Emails-Contain-Ransomware\\\">https:\/\/www.businesswire.com\/news\/home\/20160606005677\/en\/PhishMe%C2%A0Q1-2016-Sees-93-of-Phishing-Emails-Contain-Ransomware<\/a>\",\"id\":\"219dfbdc-e380-484c-b412-c61543d2dffa\"},{\"content\":\"<a href=\\\"https:\/\/www.statista.com\/statistics\/700965\/leading-cause-of-ransomware-infection\/\\\">https:\/\/www.statista.com\/statistics\/700965\/leading-cause-of-ransomware-infection\/<\/a>\",\"id\":\"88e43e84-f33a-4e57-84bb-1d83c42f7b05\"},{\"content\":\"<a href=\\\"https:\/\/www.getastra.com\/blog\/security-audit\/phishing-attack-statistics\/\\\">81 Phishing Attack Statistics 2024: The Ultimate Insight (getastra.com)<\/a>\",\"id\":\"f1f7793f-ae78-4ae5-9bf9-633248b1a2ef\"}]"},"categories":[516],"tags":[537,390,531,388],"class_list":["post-21162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-awareness","tag-cyber-crime","tag-education","tag-online-safety"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":537,"label":"Awareness"},{"value":390,"label":"cyber crime"},{"value":531,"label":"Education"},{"value":388,"label":"online safety"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/fpm-blog-post-week-1-feature-image-2-1024x538.png",1024,538,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":537,"name":"Awareness","slug":"awareness","term_group":0,"term_taxonomy_id":537,"taxonomy":"post_tag","description":"","parent":0,"count":68,"filter":"raw"},{"term_id":390,"name":"cyber crime","slug":"cyber-crime","term_group":0,"term_taxonomy_id":390,"taxonomy":"post_tag","description":"","parent":0,"count":15,"filter":"raw"},{"term_id":531,"name":"Education","slug":"education","term_group":0,"term_taxonomy_id":531,"taxonomy":"post_tag","description":"","parent":0,"count":48,"filter":"raw"},{"term_id":388,"name":"online safety","slug":"online-safety","term_group":0,"term_taxonomy_id":388,"taxonomy":"post_tag","description":"","parent":0,"count":63,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/21162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=21162"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/21162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/21180"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=21162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/categories?post=21162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/tags?post=21162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}