SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Anatomy of a Scam Checklist: Computer
More seniors than ever are online. The Pew Research Center reports that 53 percent of those 65 and older use
internet or email, and one in three (34 percent) now use social networking sites.* The National Association of
Triads, the Home Instead Senior Care® network and the FBI offer these tips for safer computer use:



Make sure your computer has all the security
it needs and a security updating system.
There are many anti-virus programs available,
ranging from expensive to free, so check
with a trusted source who is knowledgeable
about computers.



Obtain a physical address rather than simply
a post office box and a telephone number,
and call the seller to see if the telephone
number is correct and working.



Avoid sending personal information.
Scammers might send out email on bank
letterhead and say there is a problem
with the account and you need to update
information, password and account number.



Learn to identify spam and scams. Don’t
respond to emails from people you don’t
know or to emails you haven’t expected to
receive. Above all, don’t give out personal
information, including your Social Security
number and banking and credit-card
numbers, to anyone you don’t know.



When making online purchases, don’t give
out your credit-card number online unless the
website is secure and reputable. Sometimes
a tiny icon of a padlock appears to symbolize
a higher level of security to transmit data. This
icon is not a guarantee of a secure site, but it
may provide some assurance; however, don’t
trust a website just because it claims to be
secure.



Make sure you are purchasing merchandise
from a reputable source. Do your homework
on the individual or company to ensure that
they are legitimate.



Guard your account information carefully.
Be skeptical of individuals representing
themselves as Nigerian or foreign
government officials asking for your
help in placing large sums of money in
overseas bank accounts. Do not believe the
promise of large sums of money for your
cooperation.



Send an email to the seller to make sure the
email address is active, and be wary of those
who utilize free email services where a credit
card wasn’t required to open the account.
Check with the Better Business Bureau from
the seller’s area. Check out other websites
regarding this person/company.

http://www.pewinternet.org/Reports/2012/Older-adults-and-internet-use.aspx

Contact local law enforcement if you think someone has scammed your senior or
might be trying to do so. For more about protecting your seniors from scammers,
contact your local Home Instead Senior Care® office, or visit
ProtectSeniorsFromFraud.com.

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.
Anatomy of a Scam Checklist: Computer
For more information about protecting your seniors from scammers, contact your local Home Instead Senior
Care® office, or visit ProtectSeniorsFromFraud.com.
Contact local law enforcement if you think someone has scammed your senior or might be
trying to do so.

	

• Contact 1

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 2

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 3

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

	

• Contact 4

	Phone: __________________________________________________________________________
	Address: _________________________________________________________________________
	Website: _________________________________________________________________________

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.

Mais conteúdo relacionado

Destaque

Input And Output devices of computer
Input And Output devices of computer Input And Output devices of computer
Input And Output devices of computer Sayak Ghosh
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of ComputerRhenan Belisario
 
Printers And Its Types
Printers And Its TypesPrinters And Its Types
Printers And Its TypesAasim Mushtaq
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)Akhila Dakshina
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentationHarry Singh
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices pptbjslides
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices... simmi khera
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output DevicesZobia Aziz
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education pptHamid Zaib
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERRajat More
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationAna Tan
 
Generations of computer
Generations of computerGenerations of computer
Generations of computerJatin Jindal
 
The five generations of computers presentation
The five generations of computers presentationThe five generations of computers presentation
The five generations of computers presentationSwarnima Tiwari
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentationsluget
 

Destaque (20)

Input And Output devices of computer
Input And Output devices of computer Input And Output devices of computer
Input And Output devices of computer
 
Cpu ppt cse
Cpu ppt cseCpu ppt cse
Cpu ppt cse
 
Parts and Function of Computer
Parts and Function of ComputerParts and Function of Computer
Parts and Function of Computer
 
Printers And Its Types
Printers And Its TypesPrinters And Its Types
Printers And Its Types
 
Presentation on output device
Presentation on output devicePresentation on output device
Presentation on output device
 
Presentation on input devices
Presentation on input devicesPresentation on input devices
Presentation on input devices
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices...
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education ppt
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Touchscreen PPT
Touchscreen PPTTouchscreen PPT
Touchscreen PPT
 
Computer generation
Computer generationComputer generation
Computer generation
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
The five generations of computers presentation
The five generations of computers presentationThe five generations of computers presentation
The five generations of computers presentation
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Último (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Anatomy of a Scam Computer Checklist - U.S.

  • 1. Anatomy of a Scam Checklist: Computer More seniors than ever are online. The Pew Research Center reports that 53 percent of those 65 and older use internet or email, and one in three (34 percent) now use social networking sites.* The National Association of Triads, the Home Instead Senior Care® network and the FBI offer these tips for safer computer use:  Make sure your computer has all the security it needs and a security updating system. There are many anti-virus programs available, ranging from expensive to free, so check with a trusted source who is knowledgeable about computers.  Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.  Avoid sending personal information. Scammers might send out email on bank letterhead and say there is a problem with the account and you need to update information, password and account number.  Learn to identify spam and scams. Don’t respond to emails from people you don’t know or to emails you haven’t expected to receive. Above all, don’t give out personal information, including your Social Security number and banking and credit-card numbers, to anyone you don’t know.  When making online purchases, don’t give out your credit-card number online unless the website is secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but it may provide some assurance; however, don’t trust a website just because it claims to be secure.  Make sure you are purchasing merchandise from a reputable source. Do your homework on the individual or company to ensure that they are legitimate.  Guard your account information carefully. Be skeptical of individuals representing themselves as Nigerian or foreign government officials asking for your help in placing large sums of money in overseas bank accounts. Do not believe the promise of large sums of money for your cooperation.  Send an email to the seller to make sure the email address is active, and be wary of those who utilize free email services where a credit card wasn’t required to open the account. Check with the Better Business Bureau from the seller’s area. Check out other websites regarding this person/company. http://www.pewinternet.org/Reports/2012/Older-adults-and-internet-use.aspx Contact local law enforcement if you think someone has scammed your senior or might be trying to do so. For more about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.
  • 2. Anatomy of a Scam Checklist: Computer For more information about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Contact local law enforcement if you think someone has scammed your senior or might be trying to do so. • Contact 1 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 2 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 3 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ • Contact 4 Phone: __________________________________________________________________________ Address: _________________________________________________________________________ Website: _________________________________________________________________________ Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.