As I said earlier, this is currently an elaborate phishing scam looking to steal your credentials. The criminal behind the attack could change it to something even more devious in the future. For example, visiting the malicious site could infect your gadget with malware or ransomware. That’s why you need to know how to spot a phishing attack so that you don’t fall for it.

Cybercriminals always take advantage of popular websites to try and find new victims. That’s why you need to be able to recognize a phishing scam. One thing to watch for with phishing attacks are typos, criminals are typically careless with spelling and grammar. If you receive an email or notification from a reputable company, it should not contain typos. Take our phishing IQ test to see if you can spot a fake email.

Set up two-factor authentication 

Two-factor authentication, also known as two-step verification, means that to log in to your account, you need two ways to prove you are who you say you are. It’s like the DMV or bank asking for two forms of ID. This adds an extra layer of security and should be used whenever a site makes it available. Click here to learn how to set up two-factor authentication.

Use unique passwords

Many people use the same password for multiple websites. This is a terrible mistake. If your credentials are stolen on one site and you use the same username and/or password on others, it’s easy for the cybercriminal to get into each account. Click here to find out how to create hack-proof passwords.

Do not disclose sensitive data

Unsuspecting people are mistakenly handing over sensitive information to scammers all too often. If you receive an unsolicited email, do not reply with personal information. You don’t want it to fall into the hands of criminals. If a company that you do business with on a regular basis emails you and asks for personal information, type the company’s official web address into your browser and go there directly to be safe.

Protect your critical data

That’s why you should always keep a backup of your data, so you can restore your device in case of an emergency. We recommend using an online backup service such as our sponsor IDrive. With IDrive, you can backup all your PCs, Macs and mobile devices into ONE account for one low cost. Also, it has recently added a new feature called Snapshots. IDrive Snapshots is a historical view of user data stored in your IDrive account, which allows users to perform point-in-time recovery of their critical files. If your data gets infected with encryption based ransomware, all you have to do is select a timeline before infection and restore it. Click here and receive 50% off as a Komando.com reader.

Speaking of phone scams, did you know that criminals can now call you from your own number?

With the recent onslaught of robocalls and scams, it’s best just to let your phone go to voicemail. It’s a lot tougher to do when your caller ID appears to be from a familiar number or company. But you won’t believe this. Scammers are now pretending to be you! So don’t leave your data unprotected for another minute, click here now and receive 50% off as a Komando.com reader!