{"id":475,"date":"2011-09-19T13:05:53","date_gmt":"2011-09-19T13:05:53","guid":{"rendered":"http:\/\/website-website.co.uk\/?p=475"},"modified":"2011-09-26T11:48:23","modified_gmt":"2011-09-26T11:48:23","slug":"importance-safe-social-networking","status":"publish","type":"post","link":"http:\/\/website-website.co.uk\/index.php\/uncategorized\/importance-safe-social-networking\/","title":{"rendered":"The Importance of Safe Social Networking"},"content":{"rendered":"<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: medium;\">Know the Risks<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">No matter how real online interactions seem, they\u2019re not quite like hanging out with friends because you never know for sure who you\u2019re connecting with. You may be revealing personal details to a much wider audience than you realize\u2013a mix of family, buddies, acquaintances, co-workers\u2013and complete strangers. <\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">When ordinarily you might share only a part of your life with any one person\u2013intimate details with close friends, complaints about your work load with colleagues\u2013online you may be sharing everything with everybody. Unlike a private conversation, after information has been published on the Internet, it\u2019s effectively there forever. It\u2019s available to future employers, friends, job recruiters, and others with consequences you may be unable to imagine.Most people you\u2019ll meet online are genuine and decent, but just as in the rest of the world, some are up to no good. They could misuse the information you disclose to tarnish your reputation, harass you, steal your identity, even jeopardize your physical safety. They could also try to break into your computer to plant spyware, or exploit your PC to send spam or commit crimes.<!--more--><br \/>\n<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: medium;\">Advices for safer online socializing<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"text-decoration: underline;\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">1. Set your boundaries<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Think carefully about how public you want your profile or blog to be. The more identifiable the information you share, the more selective you should be with whom you share it. Evaluate the <a title=\"web development company\" href=\"http:\/\/www.goliveuk.com\/\" target=\"_blank\">social site<\/a> before you use it. Does it offer the level of control, protection, and overall experience that\u2019s right for you? Who\u2019s using it and how? Will you feel comfortable in this community? Some sites automatically make profiles public; others set them to private by default. Look for Settings or Options to control who can see your profile or photos tagged with your name, how people can search for you, who can make comments, and how to block a bully.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Carefully read the terms of use. Does the site claim ownership of your information? Resell it? Use it to target ads to you? Find out if and how vigorously the site monitors abusive interactions or inappropriate content and how to report these.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Be selective about friends. Think twice about who you accept as a friend. Consider adding only those you or close friends have met in person or with whom you have friends in common.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Periodically reassess who has access. Friends change over time. <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Review what your friends write about you. Make sure they don\u2019t post anything sensitive like private photos or your whereabouts. It\u2019s okay to ask someone to remove information that you don\u2019t want disclosed.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"text-decoration: underline;\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">2. Think before you post<\/span><\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Before you post anything online\u2013blogs, comments, tweets, snapshots, links\u2013consider two things: it may ultimately be seen by anyone on the Internet and it can be permanent. The <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">site may archive what you\u2019ve posted, friends (or ex-friends) may give it out, or hackers and security lapses may expose it.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Choose a user name that doesn\u2019t attract unwanted attention or help someone find you.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Don\u2019t over share. Don\u2019t post anything you\u2019d ordinarily say only to a close friend. Some sites let you create separate friend lists\u2013for family, for your sports team, and so on\u2013so you can manage what you share with each.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Keep details to yourself that could be used to identify you or locate you in person\u2013your home address, phone and account numbers, birth date, photos, etc.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Avoid posting provocative pictures or videos.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Use caution when sharing feelings. Whether you\u2019re happy, sad, angry, or have money worries, confiding broadly could put you at increased risk.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Talk with family and friends about what you might share about them. Remove from your pages any info that doesn\u2019t conform to their wishes.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Treat others as you would like to be treated. Be judicious about what you say on your own and others\u2019 pages. <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">TIP:<\/span><\/span><\/span><\/strong><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">If you spend time in a virtual world, don\u2019t reveal your real name. For example, if you must send e-mail to a virtual friend, set up a unique address with your character\u2019s name instead of using an account in your own name.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"text-decoration: underline;\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">3. Protect accounts with strong passwords<\/span><\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Use at least eight characters (longer is better) and include upper and lower case letters, numbers, and symbols. (Learn more about creating strong, memorable passwords at<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">microsoft.com\/protect\/yourself\/password\/create.mspx.)<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Don\u2019t share your passwords with friends or be tricked into giving them away to someone or to another site. People most often gain illicit access to accounts because the owner <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">gave them the password.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"text-decoration: underline;\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">4. Defend your computer against Internet threats<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Be wary about clicking links to video clips and games, or opening photos, songs, or other files from any source\u2013even someone you trust. A virus could have sent the file and the download could install destructive software. Check with the sender or poster or use a <a title=\"e-commerce london\" href=\"http:\/\/www.goliveuk.com\/Website_solutions_and_ecommerce\/Ecommerce_internet_solutions.aspx\" target=\"_blank\">search engine<\/a> to find the link or file yourself. <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Build up your computer\u2019s defenses and keep them up to date. Use firewall, antivirus, antispyware, and antispam software. <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Keep all software (including your Web browser) current with automatic updates. <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Be careful about installing add-on apps. Many let you enhance your personal pages, but some may damage your computer or steal sensitive data. Stick to extras that the social <\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">site recommends or ones that are reputable.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\"><strong>Email and web scams: How to help protect yourself<\/strong><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">When you read email or surf the Internet, you should be wary of scams that try to steal your personal information (identity theft), your money, or both. Many of these scams are known as &#8220;<em><strong>phishing scams<\/strong><\/em>&#8221; because they &#8220;fish&#8221; for your information. Phishing email messages are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal data. <\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\"><em>What does a phishing email message look like?<\/em><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Phishing email messages take a number of  forms:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">They \tmight appear to come from your bank or financial institution, a \tcompany you regularly do business with, such as Microsoft, or from \tyour social networking site.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">They \tmight appear to be from someone in your email address book.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">They \tmight ask you to make a phone call. Phone phishing scams direct you \tto call a phone number where a person or an audio response unit \twaits to take your account number, personal identification number, \tpassword, or other valuable personal data.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">They \tmight include official-looking logos and other identifying \tinformation taken directly from legitimate websites, and they might \tinclude convincing details about your personal history that scammers \tfound on your social networking pages.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">They \tmight include links to spoofed websites where you are asked to enter \tpersonal information.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">To make these phishing email messages look even more legitimate, the scam artists use graphics that appear to go to the legitimate websites (Windows Live Hotmail and Woodgrove Bank, respectively), but actually take you to a phony scam site or possibly a pop-up window that looks exactly like the official site.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><em><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">What does a phishing link look like?<\/span><\/span><\/span><\/em><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Sometimes phishing email messages direct you to spoofed <a title=\"web design\" href=\"http:\/\/www.goliveuk.com\/Website_solutions_and_ecommerce\/website_design.aspx\" target=\"_blank\">websites<\/a>.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">HTML-formatted messages can contain links or forms that you can fill out just as you would fill out a form on a legitimate website.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Phishing links that you are urged to click in email messages, on websites, or even in instant messages, may contain all or part of a real company&#8217;s name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate website.<\/span><\/span><\/span><\/p>\n<p lang=\"en\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\"><strong>Phishing scams that target activities, interests, or news events<\/strong><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">New phishing scams are generated whenever there is a newsworthy event, such as a natural disaster, a national election, or a significant change in the world financial system.<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Fake \te-cards<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Fake \tjob opportunities<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Donation \tscams<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><em>1. <\/em><em>Fake e-cards<\/em><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">E-cards are created the same way websites are: They&#8217;re built on the Internet, just like website pages. So when you send someone an e-card, you send them a link to click, which takes them to the online greeting card you created for them.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">This means an e-card you receive could actually be a phishing scam, spam or a spyware installer, or a computer virus.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">How to avoid fake e-cards<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Recognize \tthe sender of the e-card. If you don&#8217;t know the sender, do not trust \tthe card. Legitimate companies have standard, obvious ways for you \tto recognize that the email is not a fraud.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">For \texample, with MSN Greetings, the &#8220;from&#8221; always shows \t&#8220;Ecard from MSN Greetings&#8221; as the display name and \t&#8220;ecards@msn.americangreetings.com&#8221; as the email address.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Make \tsure you check both the display name and email address of the \tsender.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">When \tin doubt, use alternative viewing methods. Do not click any links \twhen you are not sure of the sender or intent of the email. <\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">For \texample, if you use MSN Greetings, you can view your greeting on the \tMSN Greetings website. Type &#8220;msn.americangreetings.com&#8221; \tinto your web browser and click the &#8220;ecard pickup&#8221; link in \tthe upper right-hand corner.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Never \tdownload or click anything from an unknown source.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Be \twary of an email message or file attachment from someone you don&#8217;t \tknow or that seems suspicious.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Preview \ta link&#8217;s web address before you click it. If the link doesn&#8217;t show \tan address, move your mouse pointer over a link without clicking it \tto see where the link goes. (The address should appear on the bottom \tbar of your web browser.)<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Don&#8217;t \taccept an end-user agreement without reading the fine print first; \tyou might inadvertently agree to install spyware or something else \tyou don&#8217;t want.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><em><strong>2. <\/strong><\/em><em><strong>Online job-hunting scams<\/strong><\/em><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Phishing scams might also appear as phony job ads, used to convince job hunters to send them personal information. Cyber criminals post their ads on legitimate job sites and often use familiar-looking or convincing company logos, language, and links to fake websites that appear to be those of real organizations.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">These sites might also charge fees for services they will never render. Typically, after a few days the thieves close down the scam and disappear.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Best practices for online job hunters<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Never \tprovide non-work related personal information such as your social \tsecurity number, credit card number, date of birth, home address, \tand marital status online, through email, over the phone, in a fax, \tor on your resume.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">List \tyour resume on a job site that allows only verified recruiters to \tscan them and uses a privacy policy.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Verify \ta prospective employer, recruiter, or recruiting agency through \tanother source or a phone book, and then contact them directly\u2014or \tbetter yet, visit them in person at the company location during \tregular work hours.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">If \ta prospective recruiter or employer requests a background check, \tagree to do so only after you have met with them at their company \tlocation during regular work hours.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Beware \tof anyone who asks you for money up front in exchange for finding \twork for you. You should never have to pay for &#8220;exclusive&#8221; \tjob leads or for a job itself.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">If \tyou are paying for job placement services, don&#8217;t provide credit card \tor bank information or engage in any monetary transactions unless \tdone in person, onsite, with a prospective recruiter or job agency.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Carefully \tevaluate contact information in job ads or related email messages, \twatching out for spelling errors, an email address that does not \tfeature the company&#8217;s name, and inconsistencies with area or zip \tcodes.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Create \tan exclusive web-based email address and account for all \tnon-personal communication.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\"><em>3. <\/em><em>Donation scams<\/em><\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Natural disasters, political campaigns, and global health issues are often the focus of donation phishing scams. For example, in recent years, cyber criminals have taken advantage of earthquakes and tsunamis to create illegitimate &#8220;charity&#8221; businesses to help the survivors of these events.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Most of these scams begin with an email message or a post in an online forum asking for donations in the name of well-known, legitimate charities. When you click a link, you are taken to a phony website designed to trick you into providing your personal financial information.<\/span><\/span><\/span><\/p>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: medium;\">How to avoid donation scams<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Be \ton guard if you receive an unsolicited email message from a \tcharitable organization asking for money. Don&#8217;t open any attachments \tor click any links. Manually type the charity&#8217;s web address into \tyour browser&#8217;s address bar and make sure the request is legitimate \tbefore you donate.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Double-check \tthe spelling of the organization&#8217;s website in the address bar before \tlooking through the site. Spoofed websites often use deliberate, \teasily overlooked misspellings to deceive users.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">On \tthe web page where you enter your credit card or other personal \tinformation, look for an &#8220;s&#8221; after http in the web address \tof that page. It should read: https:\/\/. (Encryption is a security \tmeasure that scrambles data as it traverses the Internet.)<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Make \tsure that there is a tiny closed padlock in the address bar, or on \tthe lower-right corner of the window.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">If \tyou are using Internet Explorer, one sign of trustworthiness is that \tthe address bar turns green and displays both https and the closed \tpadlock.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Improve \tyour computer&#8217;s defenses by always using firewall, antivirus, and \tantispyware software, and making sure to download and install \tupdates for all of your software. Use automatic updates so you don&#8217;t \thave to manually install the updates.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p lang=\"bg-BG\"><span style=\"color: #000000;\"><span style=\"font-family: Palatino Linotype,serif;\"><span style=\"font-size: small;\">Use \ta browser filter that warns you of suspicious <a title=\"web solutions\" href=\"http:\/\/www.goliveuk.com\/\" target=\"_blank\">websites<\/a>, such as the \tSmartScreen Filter in Internet Explorer 8 and the Phishing Filter in \tInternet Explorer 7.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Know the Risks No matter how real online interactions seem, they\u2019re not quite like hanging out with friends because you never know for sure who you\u2019re connecting with. You may be revealing personal details to a much wider audience than you realize\u2013a mix of family, buddies, acquaintances, co-workers\u2013and complete strangers. When ordinarily you might share [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[141,11,21,161,53,16,167,86,52,36,162,160,149,151,23,127],"class_list":["post-475","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-business","tag-design","tag-development","tag-e-commerce-development","tag-facebook","tag-internet","tag-it","tag-social-media","tag-social-network","tag-web-design-2","tag-web-design-and-development-company","tag-web-design-and-development-london","tag-web-design-london","tag-web-development-london","tag-website","tag-website-development"],"_links":{"self":[{"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":2,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/475\/revisions"}],"predecessor-version":[{"id":482,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/475\/revisions\/482"}],"wp:attachment":[{"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/website-website.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}