Posts

The Secret to Blocking Scammy, Spammy Calls from Telemarketers

If you are someone who gets spammy, scammy calls, you are not alone. You also know that they can be very annoying. Thankfully, there are a number of apps out there that can help. Here are a few of the best:

telemarketerCallApp

CallApp can be used to lookup numbers, and then you have a choice to pick up or not. It collects data from its users, and then passes on the info to you when a call comes through. CallApp Crawler is available for Android phones.

Call Control

The Call Control app allows you to block calls, do reverse look up, and even blacklist texts that are unwanted. It is easy to use, and the community supplies spam numbers to keep all members safe from scams. You can get Call Control on both Android and iOS phones.

Calls Blacklist

Calls Blacklist is another option that allows you to block calls, but also offers things like filtering calls by prefix. This means that you can block out all numbers that start with a certain prefix, like 803. You can only get this app for Android phones.

Hiya

Previously, Hiya was a simple reverse look up app, but now it also offers features like caller ID and call blocking. The app also has access to billions of records, including your own number. Hiya is available for both iOS and Android.

Norton Mobile Security

Norton Mobile Security is another option, but it isn’t necessarily an app that blocks calls. Instead, it’s a full security app that has call blocking as part of the features. This app is a great choice for people who want full security software on their phones, and it is available for both Android and iOS.

Safest Call Blocker

Safest Call Blocker is a simple app, but it is still very effective at blocking any and all unwanted numbers from telemarketers and robocallers. Just. Keep in mind that right now, it is only available for Android phones.

Should I Answer?

This is an app that looks up numbers, blocks calls, and categorizes it all to make it easy. There are more than 500,000 numbers in the data base, and you can get it for both Android and iPhone.

TrueCaller

This is one of the more popular call blocking apps out there, and it has a data base of more than 2 billion numbers. This is a great app for identifying spam numbers. But, you must keep something in mind. TrueCaller has all of this information because it also adds its users numbers to the list. This app is available for iOS, Android and other operating systems.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

How to Digitally Secure The Remote Teleworker

If you employ remote workers, your IT staff has a unique challenge keeping your organization safe. Fortunately, using a combination of best practices for cybersecurity, user awareness campaigns, and a strong policy will help to keep data safe.

New advances in mobile technology and networking have given remote workforces a boost, and while policies for most remote workers generally depend on manager or company preferences, most businesses must accommodate a mobile workforce on some level…and here’s where the challenge lies.

Things such as emails, vulnerable software programs and work documents are all tools that cybercriminals can use to infiltrate your company’s network. These remote workers, no matter how convenient they might be, are the weak link in any company’s security plan. Cybercriminals know this, which is why they often focus on these workers. So, what do you do to find a balance between the convenience of remote workers and the importance of network security? Here are eight way that you can secure your remote workforce:

  1. Use Cloud-Based Storage – One way to make your remote workers safer is to use cloud services that use two factor authentication. These often have a higher level of encryption, so any data that your workforce uses is not only accessible, but also protected.
  2. Encrypt Devices When You Can – When giving mobile devices, including laptops, to your remove workforce, make sure that the hard drives are encrypted to protect the data on the machine. However, not all security programs will work with devices that are encrypted, so make sure that you double check all the tech specs before loading them up.
  3. Set Up Automatic Updates – You can also take the steps to automate any software updates, which means as soon as an update is released, your remote workforce will get the software on their devices. This can also be done via Mobile Device Management software.
  4. Use Best Practices for Passwords – You should also make sure that you are implementing good practices with passwords. You should, for instance, safeguard against stolen or lost devices by requiring that all employees use strong, complex passwords. You should also request that your team puts a password on their phones and laptops, since these items are easily stolen.
  5. Create Secure Network Connections – Also, ensure that your remote employees are connecting to your network by using a VPN connection. Encourage your IT staff to only allow your remote workers to connect to the VPN if their system is set up and patched correctly. Also, make sure that they are not connecting if their security software is not updated.
  6. Increase Awareness – Instead of attempting to restrict personal use of the internet, you should instead encourage education about internet use. Create and enact a cybersecurity policy, ensuring that it covers concepts such as phishing, scams, and social engineering tactics.
  7. Use Encrypted Email Software – Checking business email offsite is quite common, even among those who work on-site. Thus, it is extremely important to use a secure program for email.
  8. Use an Endpoint Security Program – Finally, if you haven’t already, implement an endpoint security program. These programs can be remotely launched and managed from one location. This software should also include components to keep unpatched programs, safe.

Yes, remote workers can be a challenge for your IT staff to manage, but when you use a strong policy, good practices in response to cybersecurity, and a comprehensive campaign for user awareness, you and your staff can keep all of your data safe.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

How the Grandparent Scam Works

Remember when you were a kid, before “caller ID” (I’m showing my age here), you and your friends would make prank calls by picking up the phone and dialing any number and eventually someone would pick up the phone, you’d hang up, and laugh hard? Then do it another dozen times and with each call you would infuriate the caller, then laugh harder?

You learned that if you make enough calls, eventually you will get someone on the phone that was gullible and you could get a good laugh out of them over and over.

This same process/philosophy is what plays into telephone fraud scams. One of the easiest and most vile scams on the block is the “Grandparent Scam”.

The phone rings and an elderly person answers the phone. They may be slightly hard of hearing, and the caller says either “Grammy, Granny, Grandma, Nana, Nonna, Papa, Baba or Grandpa?”  The elderly person says ‘Yes” and the caller states “It’s your grandson!” When the elderly person responds and rattles off a name of a grandchild and says “Robby is that you”, the scammer responds “YES!” and knows he’s got a fish on the hook.

Now that the “relationship” has been established the scammer proceeds to prey upon the good nature of the grandparent and uses their love of their grandchild against them. The scammer begins to hem and haw that they’ve been arrested or are stranded or car broke down or lost their wallet and need the grandparent to wire some money to them. Once the grandparent agrees they instruct the victim to go the address of the local check cashing place that wires money and the scammer siphons as much as possible out of their victim.

This scam works so well because the victim is hooked within the first minute of the call. Once the predator sinks their teeth into their victim they will work on them until they have no money left in the world.

If there is someone in your life that could possibly, even remotely fall for this scam you need to educate them on what to look for. Put systems in place to make it difficult for them to make financial withdrawals without a cosigner.

Robert Siciliano personal security expert to Home Security Source discussing home security and identity theft on TBS Movie and a Makeover.