Identifying Family/Personal Impersonation Threats | Scribe

Identifying Family/Personal Impersonation Threats

  • Demysti5 Cybersecurity |
  • 0 step |
  • 12 seconds
    Create a Secret Family Code Word or Passphrase **Details:** 1. **Why You Need It:**\ A secret family code word ensures safety by confirming identity during emergencies or suspicious situations. For example, if someone pretends to be a family member or calls claiming a loved one is in trouble, the code word verifies their authenticity. 2. **How to Create One:** - Choose a word or phrase that is **easy to remember but hard to guess** (e.g., "Purple Pineapple" or "Grandma's Cookies"). - Avoid common names, birthdays, or predictable terms. - Make it unique to your family, like an inside joke or a memory. 3. **How to Use It:** - Teach all family members the code and its purpose. - Use it when: - Picking someone up unexpectedly. - Answering unknown calls or messages claiming to be from family. - Communicating during emergencies. 4. **When to Update It:** - Regularly change the code word, especially if it’s accidentally revealed or no longer secure. - Share updates only in person or through secure means. 5. **Reinforce the Habit:** - Practice using the code word with children and other family members. - Emphasize its importance for safety, not casual use.
    **Verify the Sender’s Identity** - If you receive a suspicious message asking for money or personal information, pause before responding. - Contact the person who supposedly sent the message through another communication method that you trust, like calling their known phone number or talking to them face to face.
    **Compare with Past Interactions** - Think about how this person usually talks to you. Is the language in the message similar to how they usually write or speak? - Consider their usual requests or behavior. Does this message fit their normal pattern? - Ask them about any recent meetings such as where was the last time we had lunch together or what was my birthday gift to you.
    **Look for Red Flags** - Be cautious if the message has urgent requests for money or sensitive information, especially if this isn't typical for the person claiming to have sent it. - Notice if there are any mistakes in the message that the person wouldn't usually make, like spelling their name wrong or getting details about your relationship incorrect.
    **Check Security Measures** - If the message involves financial transactions, reach out to your bank or financial institution to confirm any security protocols, like two-step verification, that could prevent unauthorized access to your accounts.
    **Seek Second Opinions** - If you’re still unsure, ask a family member or a friend if they’ve received similar messages or if they think the message seems suspicious.
    **Report Suspicious Activity** - If after these steps the message still seems suspicious, report it to the appropriate authorities or support teams of the service you’re using, like your bank’s fraud department or a social media platform’s help center.
    Want to make guides like this in seconds? Yes, it's really that fast.
    This Scribe is in tip-top shape!Leave feedback if there are any issues with this Scribe