Loading article

Your Security

Online Shopping...be cautious!

Internet purchases are the order of the day: clothing, food, technology products... Everything we want is within our reach with just one click. This gives us, above all, convenience and speed when buying any product. It is no longer necessary to physically go to the store or spend too much time on it to have any product that we want. However, this comfort can be affected if we buy in the wrong place. Cyber criminals are in charge of this who, by taking advantage of certain vulnerabilities of a web or supplanting the identity of known stores, manage to deceive the user to obtain information such as passwords or card data. And, although the risk exists, the solution is not to stop buying online.

Buying online is not a dangerous practice if you take a series of simple recommendations. Do you want to know which? Keep reading and prevent a click from spoiling your purchases.


Buying online allows us to acquire products quickly and with great comfort, but if we do it from a fraudulent page, certain information may be in danger:

Personal information

Card numbers


So that your purchases are secure, be cautious and...

Purchase on websites that have a digital certificate verifying that "https" or a green padlock appears in the browser bar.

Check that the store’s data is published (fiscal address, CIF…) and read the changes and returns policies.

Find opinions from other users who have already purchased there.

Use a card exclusively fro this type of purchases.

If you are connected to a public Wi-Fi, do not make any purchases online.

Scams on the Internet ... Don't fall for it!

"Congratulations! You've just won an incredible trip! Do you want to work from home? Send us your information and we'll call you."

Does it sound familiar? Have you ever received a message like these?

Awards that do not exist, unbeatable job offers, products at prices too low... These are just a few examples of scams that circulate nowadays on the Internet.These are actually scams that have existed throughout life but, over time, have had to adapt to new technologies making the Internet the ideal place to operate from.

But... Would you know how to detect them?

These false offers often come through emails, SMS, instant messaging or even social networks. Through a fraudulent link they take you to pages where they request certain information (especially bank information). Other times, the succulent offers require that you call a telephone number through which you end up subscribed to a service for which your phone bill will be increased at the end of the month and sometimes even request an advance payment for products that you will never receive.

In short, these are different frauds that are the order of the day and can reach anyone with a simple click. If you want to know how to detect them so as to avoid falling into them, follow the advice below.

The scams of a lifetime are on the Internet today:

False job offers via email

Donations through fraudulent websites.

Online sale of products that do not exist.

Stay alert and avoid falling into them:

If you are offered prizes or bargains in exchange for providing certain personal information (passwords, bank details ...) do not provide it.

Search the internet for other users' opinions on the offer, web...

Be suspicious of offers too good to be true accessed through a link.

If you are going to buy a product online, make sure it is a trusted website and choose a safe means of payment.

Social Networks, be careful of what you share!

Social networks have become our photo albums, our bulletin boards, even our voice. We publish what happens to us during the day, we give our opinion on news, we participate in debates... And all this, very often, publicly.

Twitter, Facebook, Instagram, Snapchat, LinkedIn and many other social networks work as a showcase of the lives of millions of people. However, although we love to share our experiences with our contacts, we must take into account that if we do without taking a series of precautions, all the information we publish may end up being accessible to other users of the social network, who could make an X-ray of our lives if they wanted to. This is a tactic widely used by cybercriminals. They use our publications to get information, impersonate identities, steal credentials or even blackmail us asking for something in exchange for not distributing an image or publication.

If you want to know how to avoid being a victim more, use social networks safely. Here's how:

Follow our advice and use them safely:

Protect them with strong passwords and do not share them with anyone.

Accept requests from acquaintances only.

Set up privacy and decide who can see your posts.

Do not share personal information with just anyone.

Avoid publications that could damage your reputation.

Be suspicious of publications with ads, sweepstakes and irresistible offers.

Beware of messages that contain links.

Security on every click when browsing the Internet

In life you an identity that defines you and differentiates you from others according to your name, traits, personal characteristics, acts... On the Internet you also have what is known as "digital identity".

With just one click, we can search information on a website, publish on social networks, check our email, buy or even do banking.

This facility to access the Internet and everything we need simplifies our day to day, but... Are we aware of the dangers after each click?

Just as in real life there are criminals, on the Internet, cybercriminals exploit every neglect, both human and technical, to steal information, propagate viruses or take any action they can use for their own benefit.

However, safe surfing is possible. How? Take a look at the following infographics and video.

Some threats that may hide behind clicks

Malicious pages.

Pages that lead to fraudulent sites.

Files with viruses.

Avoid falling into them and move on the Internet safely

When providing sensitive information (passwords, bank data…) on the web, check that the browser bar shows HTTPS or a green lock.

Disable the “remember passwords” option and close your sessions on exit.

Occasionally delete browsing history, cookies and temporary files.

Pay attention to links and attachments before clicking on them.

Keep your computers up-to-date (operating system, browsers and applications) and install, whenever possible, an antivirus.

Phishing: A click makes a difference

Phishing attacks are increasingly sophisticated and convincing. They confuse users to compromise their own security. These cybercriminals use many excuses to capture our attention and redirect us to fraudulent websites that pretend to be legitimate: urgent updates, packages that you have not requested but need to collect as soon as possible, notices of a last payment, the bank asking you to change your password and so on...

How do they do it?







How do I know if it's really ScottishPower?

where it comes from

Where is it coming from?

Make sure the email comes from @scottishpower.com or @scottishpower-online.co.uk


What is the tone?

Pay attention to the tone of the content. Be suspicious if it requires urgent action or sounds too good to be true

ScottishPower link

Is the link ScottishPower?

Before clicking on a link and giving any data, check that the link goes to @scottishpower.co.uk or @campaign.scottishpower-online.co.uk

What if I receive suspicious calls

Don’t be alarmed but be vigilant. Help protect yourself from fraud by following these simple steps:

  • Never disclose your bank or credit card pin numbers or online / telephone banking passwords and security information.
  • If a caller states they are from your bank and mentions an unusual transaction, be very cautious about providing any details and take steps to confirm the caller’s identity.
  • If you receive any suspicious calls saying they are from a trusted service provider, hang up and check with your service provider.
  • If you have concerns about the security of your financial or personal details, you should contact your bank as a precaution so they can provide appropriate advice.
  • Contact www.actionfraud.police.uk to report it

We understand the importance of keeping your personal details safe. To find out more visit www.getsafeonline.org


It quickly installs in your system and locks your files. The only way to get them back is by paying a ransom... Do you know what we are talking about?

Ransomware is a type of virus that can encrypt (lock) all of the information on your mobile or desktop devices. To get access to your information, the Ransomware software will demand a payment from you in exchange for a key to decrypt the information.

Ransomware may reach you through:

Emails containing infected attached files

Fraudulent links

Malicious websites

How to protect yourself from ransomware

Verify the sender

If you receive an email with a link or file attached, verify that you recognise the senders email address, and that any links are redirecting you to an authentic website.

Create backups

Make periodic backup copies of your important information, and save them elsewhere.

Use an antivirus

Have an antivirus application installed with the latest updates on your devices.

Update devices

Keep your devices up to date with the latest operating system and security updates.

What do you do in the event of a ransomware attack?

Never pay the ransom

Contact www.actionfraud.police.uk to report it


The keys to your digital identity

You access services that require a password on a daily basis, including social networks, online banking, email, online stores, etc. This is why we say your passwords constitute the keys to your digital identity.

In the same way you look after your house keys, your passwords must also be protected, because if someone gains access to them, they might use them for identity theft or to carry out operations in your name, seriously compromising your privacy.

How to manage your passwords in a more secure manner

Have a look at the following tips and discover how to correctly manage your passwords:

Create robust passwords:

Containing more than 8 characters, using capital and lower case letters, symbols and numbers.

Use different passwords:

For each of your services (email, social networks, banking...).

Keep passwords personal:

Your passwords are personal and non-transferable. Do not share them with anyone.


Change them:

You should update your passwords periodically

Use a password manager:

If you have several passwords and these are hard to remember, use a password manager. These allow you to store them in a safe manner under a single key


Two-step verification:

Always opt for two-step verification.

The mobile, a lifetime in your pocket

The mobile, that device that goes with us wherever we go has become a necessary element for our day to day. Not only can we call, "WhatsApp" or surf the Internet with it, we have all our contacts, photos, personal mail, and apps ... saved in it. Practically, everything we may need in our day to day is concentrated in this small device.

Have you ever wondered what would happen if, suddenly, it were affected by a virus and stopped working? What if you lost it or it were you stolen? What would happen is that not only would you physically lose your device, but you would not have access to all the information contained therein either... With all the headaches this entails!

Of course, we cannot prevent, situations such as those mentioned above from happening, but what we can do is take a series of precautions so that, in case this happens, our information will not be affected at any time.

If you want to know how to act, follow our advice and protect your mobile.


Your mobile contains valuable information. If it is lost, stolen or infected by any virus type, part of your life (contacts, photos or even bank details) could be affected.

Do not risk it, protect it:

Keep the operating system and installed applications up-to-date.

Download applications only from official sites and verify that the permissions they request are those necessary for their operation.

Periodically make back-ups of the most important information.

If your mobile allows it, install an antivirus and keep it updated.

Turn off Wi-Fi and Bluetooth when not in use.

Do not lose sight of it and protect it with a pin or unlock pattern.

Install an application that allows you to locate the mobile and delete its contents remotely in case of loss and theft.

Digital Identity, protect who you are

Just as in your life you have an identity that defines you and differentiates you from others according to your name, traits, personal characteristics, acts... On the Internet you also have what is known as "digital identity".

The digital identity is the virtual image that is created of your person based on what you share on the Internet (likes, personal data, opinions...), but also what others share about you (photos tagged, comments...).

Have you ever tried to find your name on the Internet? Photos, professional profiles, sports test results... These are just a few examples of information that anyone can know about you with just a simple search.

What if someone uses that information against you? In the event that someone, with not very good intentions, accessed that information, they could use it against you by making negative publications about you or even supplanting your identity in the worst case scenario.

To prevent this from happening make sure you decide what you want to share with others, here are some tips to help you take care of your digital identity.

How is your digital identity built?

With the information you upload to the internet..

With information that others upload about you.

If you do not take care of it, it may be that...

Your image is damaged by negative comments about you.

Someone impersonates your identity (by publishing or performing actions in your name).

So, how to protect it?

Protect your accounts with strong passwords and use different passwords for each one.

Periodically, look for your name on the internet and check what information there is about you.

What you publish says a lot about you. Be careful with the information you share.

Watch out for public Wi-Fi's Avoid accessing services that require personal information if you are not sure that you are on a secure network.

Check the privacy settings of your social networks. and decide who can see your posts, tag you...