How do we protect our information in today's digital world?
All forms of communication can be used by criminals to extract and exploit. Even when avoiding calls, messages, and emails from unknown sources, we can find ourselves in moments of uncertainty.
These simple practices can help:
1) Pause - Bad actors use urgency for leverage. Give yourself time to think clearly and get a second opinion.
2) Pivot - Following links from unsolicited sources can lead to compromised passwords or malware. Contact individuals and institutions directly using known channels of communication.
3) Prove - Create a code phrase (in advance) that only your family members know. This code phase can be called upon to verify identity in rare high-stakes situations.