Hook, Line and Sinker: A Look at Phishing Schemes

October 31, 2017


Email phishing schemes are big business for thieves: The FBI’s Internet Crime Complaint Center (www.ic3.gov) estimates that this type of fraud resulted in more than $5 billion in losses between October 2013 and the end of last year. In recognition of National Cyber Security Awareness Month, here are some tips to help you spot a phishing scheme.

The hook

  • The email address – Email addresses can easily be spoofed to look like they came from a friend or relative, or perhaps a well-known business. The address is important because it helps the thief appear legitimate.
  • The appearance – The body of the email can easily include a company’s logo or other official-looking information. You’ll want to check for other signs of fraud, such as poor grammar or threatening language.

The line

  • Requests for personal information – Be suspicious if an email requests your login information, Social Security number, date of birth, credit card number, account number or other sensitive personal information. Reputable organizations generally do not ask for this type of information unless you initiated the conversation.
  • A sense of urgency – Phishing schemes try to persuade you to act now and think later. The email may offer you a chance to earn quick cash or claim there is a problem with your account that must be addressed immediately.

The sinker

  • Links and attachments – Hackers will include bad links or attachments in their emails. If you click on or open them, it could install viruses or malicious software on your device, which then gives them access to your history.

Don’t take the bait

Delete suspicious emails without clicking on anything in them. If you’re unsure whether a family member, friend or company needs to reach you, contact them through a phone number you already know or an email address listed on their official website.

If you’d like to report a phishing scheme, forward the email to spam@uce.gov and to the actual company, bank or organization impersonated in the email.

For more tips on how to protect yourself, visit www.edwardjones.com/fraud or https://identitytheft.gov.

Enable two-step authentication for additional security

Edward Jones recommends two-step authentication for your Online Access login to provide you with an extra level of protection. This feature confirms your identity by combining your standard login with an additional security question or verification code sent to your mobile device. You can set up and customize this option in the security preferences section of your online access account. For more information, visit www.edwardjones.com/secure.

Find a Financial Advisor

Find a Financial Advisor

Select a State and then enter a last name

    Common Types of Fraud

    Ways you could become a victim of fraud

    Read more

    How to Protect Yourself

    Being proactive could save you time and money.

    Read more