Tips: Avoid Financial Scams

 You’ve worked hard over the years to get where you are today. Don’t let unscrupulous fraudsters cheat you out of your hard-earned money. The Texas Society of Certified Public Accountants (TSCPA) offers tips for avoiding financial scams.
  • Only donate to recognized charities. If someone calls or e-mails you asking for a charitable donation, check out the organization before you give. You can sometimes spot bogus charities because they often use high-pressure tactics. A good rule of thumb is to determine at the beginning of each year how much money you want to give and to which organizations you want to give it. Look up recognized charities online at http://www.irs.gov (under Charities & Non-Profits) and http://www.GuideStar.org.
  • Think twice before buying a product from a television infomercial. Sure you might get three items for a limited time-only low price of $19.95, but buying products off a television infomercial can really cost you. If you want to return a product, questionable TV sales can sometimes put up lots of obstacles between you and your refunded money.
  • Be leery of e-mail solicitations. E-mail can be wonderful for swapping pictures of the grandkids, but it can be hazardous if your personal financial information is compromised. Banks don’t e-mail you about your account status. The e-mails are scams set up to resemble legitimate companies like Chase, eBay and PayPal. If you get these and other hoax e-mails like the Nigerian scam, delete them from your inbox. The Federal Bureau of Investigation’s Web site provides information on electronic scams. Sign up for e-mail alerts to learn about the latest scams and warnings at http://www.fbi.gov/cyberinvest/escams.htm.
  • Don’t make loans or give expensive gifts to caregivers. It is generally a violation of company policy for a caregiver to accept a loan from a client. If your caregiver approaches you for money, call the caregiver’s employer or talk to your family.
  • Watch out for home repair scams. It’s nice to have friends stop by for a visit, but it’s not so nice to open the door to a home repair scam. Beware of “contractors” who knock on your door and say your roof or driveway are in need of repair. Ask for a business card and thoroughly investigate the company and/or get a second opinion before agreeing to any repair work. The Texas Attorney General’s Office has helpful consumer protection information on their Web site at http://www.oag.state.tx.us.
  • Exercise caution when discussing your finances. It’s not pleasant to think about, but sometimes even family members can get greedy. If you feel uncomfortable about a loved one’s intentions regarding your finances, talk to another family member or the police about the situation.  

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3