We are dedicated to ensuring the security and protection of your funds at all times, and we would like to empower you with the knowledge and best practices to help you protect yourself against fraud and keep your funds safe.
You should be vigilant of phishing attempts.
1. Beware of suspicious emails – exercise caution when receiving emails requesting personal information, financial details, or urging immediate action. Avoid clicking on links or downloading attachments from unknown or suspicious sources. If something seems too good to be true, it probably is.
2. Verify the email sender – verify the sender's email address against the legitimate contact information of the recipient/platform you are communicating with to ensure accuracy. Be wary of emails that appear slightly altered or misspelled, or have suspicious domain names. For example, if a party you are paying suddenly changes the payment information for an invoice, or their communication style abruptly changes, delay the transfer and speak to someone you trust over the phone.
You should verify the legitimacy of your recipient / third party.
1. Research the business / third parties – before initiating a transfer to a third party, it is essential to conduct research on their reputation, legitimacy, and credibility. Make sure to read reviews, and testimonials, and consult other reliable sources to verify that the recipients are trustworthy.
2. Confirm the contact information – verify the contact details of the third party, such as their email address, phone number, and physical address, independently and thoroughly, rather than simply relying on the information provided by your point of contact.
You must exercise caution with sensitive information:
1. Limit sharing your personal information – avoid sharing unnecessary personal information with third parties. Only provide the necessary information for the transaction and exercise extreme caution when disclosing sensitive data such as your social security number, passport information, or bank account details, unless it is absolutely essential.
2. Secure Communication Channels – when sharing sensitive information, ensure that you use secure and encrypted communication channels to protect your data from unauthorized access. You can verify that the website URL begins with “HTTPS” and check for the lock icon in your browser's address bar. Additionally, many messaging apps, such as WhatsApp, offer end-to-end encryption.
If you think you may have been scammed already, please read our guidance here.