From the Global Information Security Team
EDUCATE. MITIGATE. SECURE.
When you click "agree" to a website or app's terms and conditions, you usually allow the company to track your personal information.
Here are examples of what you are agreeing to when using a few well-known brands. Click on the green arrow to advance to the next page.
How many of us take time to read terms and conditions? This summer, the Wi-Fi company Purple conducted a two-week experiment.
Purple included some ridiculous requirements in their terms, but users had to read the entire document to discover exactly what they were agreeing to.
Requirements included, "you agree to provide your first born child as payment" and "you agree to donate 10,000 hours of community service manually relieving sewer blockages and cleaning portable lavatories at local events."
Over 20,000 subscribers clicked "accept." Only one objected.
> Ads in Facebook feeds for great deals on airline tickets could be fake. Infosecurity Magazine says beware of links to airline websites that look real, but have web addresses that end in ".us" instead of ".com".
> According to Dashlane, the password manager company, Uber, Spotify, Pandora and Netflix allow users to select passwords that are too easy for fraudsters to crack. Solution: make sure your passwords are more than eight characters long.
We sprinkled cyber security terms throughout this puzzle.
See how many you can identify!
And when you are finished,
click on the button below to view the answers.
Uh, oh. You're surfing the web when suddenly,
your computer screen appears to freeze.
A message appears warning you that your computer has a virus
and it won't work until you call a toll-free number for help.
It's a scam. The FTC says over the past two years,
nearly 100,000 consumers in the US
have lost an average $280 each because of it.
Watch the video below to learn more.
Click on a link below to download our Tip-of-the-Month October calendar. Choose the link that is closest to the size of your monitor.
One last thing...
In the upcoming edition of cyber security news:
A "smish"is one way crooks use smartphones to steal personal information.
We'll show you how to identify and avoid smishes.
Facebook, Kindle, iTunes, Instagram and Twitter names, logos and brands are property of their respective companies.
Terms and conditions outlined in this edition's article
were accurate as of August 1, 2017.
Desktop wallpaper photo © 2017 Colby Brown
Cartoon: Peter C. Vey The New Yorker Collection/The Cartoon Bank
Original content and design © 2017 Aware Force LLC
Aware Force name and trademark © 2017 Aware Force LLC