Loading article

Your Security

Phishing: A click makes a difference

Phishing attacks are increasingly sophisticated and convincing. They confuse users to compromise their own security. These cybercriminals use many excuses to capture our attention and redirect us to fraudulent websites that pretend to be legitimate: urgent updates, packages that you have not requested but need to collect as soon as possible, notices of a last payment, the bank asking you to change your password and so on...

How do they do it?

email

Email

sms

SMS

social

Social

How do I know if it's really ScottishPower?

where it comes from

Where is it coming from?

Make sure the email comes from @scottishpower.com or @scottishpower-online.co.uk

tone

What is the tone?

Pay attention to the tone of the content. Be suspicious if it requires urgent action or sounds too good to be true

ScottishPower link

Is the link ScottishPower?

Before clicking on a link and giving any data, check that the link goes to @scottishpower.co.uk or @campaign.scottishpower-online.co.uk

What if I receive suspicious calls

Don’t be alarmed but be vigilant. Help protect yourself from fraud by following these simple steps:

  • Never disclose your bank or credit card pin numbers or online / telephone banking passwords and security information.
  • If a caller states they are from your bank and mentions an unusual transaction, be very cautious about providing any details and take steps to confirm the caller’s identity.
  • If you receive any suspicious calls saying they are from a trusted service provider, hang up and check with your service provider.
  • If you have concerns about the security of your financial or personal details, you should contact your bank as a precaution so they can provide appropriate advice.
  • Contact www.actionfraud.police.uk to report it

We understand the importance of keeping your personal details safe. To find out more visit www.getsafeonline.org

Ransomware

It quickly installs in your system and locks your files. The only way to get them back is by paying a ransom... Do you know what we are talking about?

Ransomware is a type of virus that can encrypt (lock) all of the information on your mobile or desktop devices. To get access to your information, the Ransomware software will demand a payment from you in exchange for a key to decrypt the information.

Ransomware may reach you through:

Emails containing infected attached files

Fraudulent links

Malicious websites

How to protect yourself from ransomware

Verify the sender

If you receive an email with a link or file attached, verify that you recognise the senders email address, and that any links are redirecting you to an authentic website.

Create backups

Make periodic backup copies of your important information, and save them elsewhere.

Use an antivirus

Have an antivirus application installed with the latest updates on your devices.

Update devices

Keep your devices up to date with the latest operating system and security updates.

What do you do in the event of a ransomware attack?

Never pay the ransom

Contact www.actionfraud.police.uk to report it

Passwords

The keys to your digital identity

You access services that require a password on a daily basis, including social networks, online banking, email, online stores, etc. This is why we say your passwords constitute the keys to your digital identity.

In the same way you look after your house keys, your passwords must also be protected, because if someone gains access to them, they might use them for identity theft or to carry out operations in your name, seriously compromising your privacy.

How to manage your passwords in a more secure manner

Have a look at the following tips and discover how to correctly manage your passwords:

Create robust passwords:

Containing more than 8 characters, using capital and lower case letters, symbols and numbers.

Use different passwords:

For each of your services (email, social networks, banking...).

Keep passwords personal:

Your passwords are personal and non-transferable. Do not share them with anyone.

 

Change them:

You should update your passwords periodically

Use a password manager:

If you have several passwords and these are hard to remember, use a password manager. These allow you to store them in a safe manner under a single key

 

Two-step verfification:

Always opt for two-step verification.

The mobile, a lifetime in your pocket

The mobile, that device that goes with us wherever we go has become a necessary element for our day to day. Not only can we call, "WhatsApp" or surf the Internet with it, we have all our contacts, photos, personal mail, and apps ... saved in it. Practically, everything we may need in our day to day is concentrated in this small device.

Have you ever wondered what would happen if, suddenly, it were affected by a virus and stopped working? What if you lost it or it were you stolen? What would happen is that not only would you physically lose your device, but you would not have access to all the information contained therein either... With all the headaches this entails!

Of course, we cannot prevent, situations such as those mentioned above from happening, but what we can do is take a series of precautions so that, in case this happens, our information will not be affected at any time.

If you want to know how to act, follow our advice and protect your mobile.

 

Your mobile contains valuable information. If it is lost, stolen or infected by any virus type, part of your life (contacts, photos or even bank details) could be affected.

Do not risk it, protect it:

Keep the operating system and installed applications up-to-date.

Download applications only from official sites and verify that the permissions they request are those necessary for their operation.

Periodically make back-ups of the most important information.

If your mobile allows it, install an antivirus and keep it updated.

Turn off Wi-Fi and Bluetooth when not in use.

Do not lose sight of it and protect it with a pin or unlock pattern.

Install an application that allows you to locate the mobile and delete its contents remotely in case of loss and theft.