Be cyber smart to stay cyber safe.

When It’s Too Good To Be True

Summary

If it sounds too good to be true, it probably is. This phrase serves as a reminder to be vigilant, especially when considering financial offers or information that appears to lack verifiable proof. It’s a call to investigate thoroughly before believing or acting on the offer

To Good To Be True
Red Flags

Look for these red flags before you click:

  • The offer cannot be traced back to a legitimate source or does not provide contact information other than an email address.
  • The firm’s domain has misspelled words or an unfamiliar domain, such as .ru, .tk, or .buzz.
  • Guaranteed return on your investment with little to no risk.
  • Contacted by an unlicensed investment professional
  • Sensational or over-the-top pitches that may have fake testimonials
  • Pressure to ‘act now’ or you will miss out on the opportunity.
  • Request to pay through cryptocurrency or wire transfers to an unverifiable source.
  • The requester requests bank account information that a legitimate source would already possess.
  • Payment is required up front, and there are no refunds or returns.
  • Untraceable or irreversible payment options only are accepted.
  • Received an unexpected email or text message offering great deals from a merchant you have no affiliation with.
  • The web domain is not that of the store or firm.
  • All feedback about the organization is recent and provides five-star positive feedback.
  • The offer is listed as free for popular items.
Prevention Tips
  • Stop. Think. Ask yourself, “Is this too good to be true?” Then, educate yourself about fraud tactics and how to prevent yourself from becoming a victim.
  • Stop. Think. Verify before you click – Use reliable resources to research offers to minimize your risk
  • Never click on links from people or firms you do not know, or open files attached to emails.
  • Always use a secure connection (https:// and padlock icon) when sharing personal or banking information.
  • Never provide your confidential information to businesses that already have that information.
  • Always use multi-factor authentication combined with hard-to-guess passphrases.
  • Stay up to date with all mobile device and tablet patches, as well as personal computer patches.
  • Invest in security solutions to block and protect your mobile devices from phishing and SMS text scams.
Resources