Recently a customer received a request from his e-mail provider. He was asked to provide his password and other information. The request looked legitimate, so the customer complied.

We all grow accustomed to sharing personal information. Perhaps you’ve often been asked, “What is your username and password?” At one time or another you have given out information—likely everything from your favorite color to your Social Security number. Truth is, out of necessity we are constantly being asked to identify ourselves.

As it turns out, the above mentioned customer in fact had not received an e-mail from his e-mail provider. In the end, his email account was hijacked, and the customer’s contacts received a request for money through his email account. Frustrating, huh?

Before you share:

  1. Verify The Source – A legitimate-looking request for personal information, may not be legitimate at all; take time to identify the source. Question the questioner.
  2. Be Familiar With The Policy – Many companies state what information they may request and how it will be requested. Be skeptical of policy deviations.
  3. Confirm The Necessity – Sometimes requested information is not pertinent to the business at hand. Share only that which is appropriate.

Click here for additional information.

Interested in improving and protecting your business? Contact us – we’re here to help.

Subscribe to the newsletter...