Buying Options
Additional Information
When it comes to beating scammers and fraudster in the cyber attack game, there are some key actions you should always follow:
- Restrict computer use to work-related functions to avoid the chance of receiving or opening a phishing email.
- Avoid clicking on links in emails from unknown senders, or in emails that are suspicious.
- Don’t share system passwords. Ever!
- Follow all processes and procedures – especially those that include wire transfers and monetary transactions.