Technology

5 Tips for Safe Mobile Banking

Check out these five tips from the Washington Department of Financial Institutions about protecting your money and identity when banking on a smartphone or tablet.

Cyberbullying

Cyberbullying is bullying or harassment that happens online. It can happen in email, text message, a game, or on a social networking site. It might involve spreading rumors or images or creating a group or page to make a person feel left out. Read more

CyberFraud Section, FL Attorney General

The Florida Attorney General’s Office reviews, investigates, and enforce penalties against companies or individuals that take advantage of consumers through internet-related fraud. Read more

Disposing of Old Computers

You can ensure the hard drive in your old computer won't get misused by identity thieves. Use a program to overwrite or wipe the hard drive, or remove the hard drive and physically destroy it. Read more

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device, or returning one that didn’t work out for you? It’s important to delete any personal information you stored on the device. Read more

E-Mail Spam (GA)

“Spam” usually means unsolicited mass commercial email messages from a sender who doesn't have a business relationship with a recipient. The Georgia Slam Spam E-Mail Act penalizes some abuses related to spam messages.

File a Complaint with the FTC

The FTC is the nation’s consumer protection agency. If a business doesn’t make good on its promises or cheats you out of your money, the FTC wants to know.

Investing Online

Investment opportunities that claim to be low risk and high reward are almost always frauds. When you research investments, turn to unbiased sources. Update your security software on any computer you use to access your financial accounts. Read more

Kids and Mobile Phones

When you decide your children are ready for a mobile phone, teach them to think about safety and responsibility.

Malware

Malware (short for “malicious software") includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. Criminals use malware to steal personal information, send spam, and commit fraud. Read more

Marketing Your Mobile App: Get It Right from the Start

Maybe you want to get in on the growing app business.  Maybe you work for an exciting start-up or on your own.  Regardless of the size of your business, the Federal Trade Commission has guidelines to help you comply with truth-in-advertising standards and basic privacy principles. Read more

OnGuard Online.gov

Learn how to secure your computer, keep kids safe online, and steer clear of scams this federal government website.

Online Auctions (WI)

Thinking of bidding in an online auction, or selling some of your stuff? Internet auctions are a great resource for shoppers and sellers, but you need to watch out for some pitfalls. Find out how.

Online Privacy & Technology

The Privacy Rights Clearinghouse (PRC) publishes in-depth guides on technology and your privacy. Learn how to secure your computer, privacy tips for using social networking sites, what information your smartphone gathers and shares, and more.

Phishing, Vishing, Smishing – Don’t Take the Bait! (WI)

Fraudsters use email, voicemail, and text messages to try and capture your personal information.  Watch for warning signs and protect your personal information.

Private Internet Sales (WI)

A simple amount of research can give you a good idea if the online product or the seller is suspicious. Read more

Protect Your Computer from Malware (Video)

Learn how to avoid, detect, and get rid of viruses and spyware on your computer.

Protecting Kids Privacy

The Children's Online Privacy Protection Act (COPPA) helps you protect your children's privacy. COPPA requires websites to get parental consent before they collect or share information from children under age 13.

Protecting Your Computer from Hackers (WI)

Follow these simple steps to help prevent hackers from taking over your computer and personal information.

Safety Tips for Mobile Devices

Mobile devices can be as powerful and connected as a PC or laptop. Learn safety precautions from the STOP. THINK. CONNECT. coalition. Read more

Scam Stopper

BBB Scam Stopper helps people avoid wasting money or leaking personal information to a scam. With the growth of social media, internet shopping, online banking and other technology, scams are taking on new forms. It's often difficult to tell a legitimate offer from a scam in disguise.

Sharing Information: A Day in Your Life (Video)

Everyday activities like using a savings card at the grocery store or a social networking app on your phone may give businesses access to information about your habits, tastes, and activities. Where does that information go and how is it used?

Shopping for High-Speed Internet Service

You can get high-speed internet access through a variety of services. When you shop for internet service, it helps to understand the differences between these services and know what questions to ask.

Shopping Online

For hassle-free online shopping, get the details about what you're buying, pay by credit card, keep records, and protect your personal and financial information.

Spam…It’s Junk Email & Texts (WI)

Often spam is promoting get rich quick schemes and questionable products. Common scams are chain letters, work at home schemes, weight loss potions, credit repair offers, advance fee loans, vacation offers, and adult entertainment. Read more

Texting Spam – “Smishing” (WI)

With the growing popularity of texting, phishers are using it as another means to gather consumers' personal information. This is known as “smishing.”

Unwanted Faxes: What You Can Do (WI)

The Telephone Consumer Protection Act of 1991 (TCPA) and Federal Communications Commission (FCC) rules prohibit sending unsolicited advertisements, also known as “junk faxes,” to a fax machine. This prohibition applies to fax machines at both businesses and residences. Read more

Using Public Wi-Fi Networks

Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient, but are often not secure. When using a hotspot, it’s best to send information only to websites that are fully encrypted.

What To Do If You Get a Robocall (Video)

Learn what a robocall is, when it is illegal, and what to do if you get one. Watch the video