Fraudsters are likely to contact you by phone or email. This public information is easy to obtain. To protect yourself from becoming a victim, we recommend that you take some time to educate yourself on how these people may try to obtain your personal information.
Social engineering involves tricking you into unknowingly disclosing confidential information like passwords or personal information. Social engineers or impersonators use techniques to bypass existing security measures by first gaining your trust. They use influence and persuasion to convince you they are someone they’re not. Consequences of social engineering attacks include fraud, identity theft or theft of confidential information.
Here’s what you can do:
Fraudulent activity often appears legitimate at first glance or provides an incentive too good to pass up. Individuals may pose as representatives of a reputable company, often using company names and corporate logos to make their solicitation more convincing.
Phone solicitations may offer cash gifts, free travel or prizes in exchange for personal or account information. Advertisements in newspapers may promote special rates and offers where, upon calling, you are asked for personal information or for an advance payment before the transaction can be completed.
Email addresses obtained from subscription lists, websites, chat rooms, online auctions, etc., may appear to be from institutions you have an account with. Mail can be illegally intercepted, and the information used to solicit your personal or account information.
Here are some ways to validate the legitimacy of organizations that you may deal with:
These techniques are designed to encourage customers to divulge personal and financial information over the Internet by appearing to be legitimate, branded web sites of trusted organizations.
Phishing scams use fraudulent emails or pop-up web pages that appear legitimate and are designed to deceive people into sharing personal or financial account information. They often use the logo or other identifier of a reputable company and request urgent action to provide, update or verify your information.
The following is an example of how it usually works. You receive an email that looks legitimate complete with the company’s logo. The email requests that you click on a link provided in the body of the email. The reason for the request can vary from reactivating your account due to a technical upgrade or claiming that fraud has been committed using your card. The link will take you to a fraudulent website that will ask you to enter your personal information. They can then use this information to access your online accounts to withdraw money or make purchases, or even open new accounts in your name.
Pharming scams occur when you enter a web address into your browser. It will redirect you to a fraudulent website without your knowledge. The website often looks similar to the legitimate site in hopes of capturing your confidential information. The scammers often use the logo or other identifier of a reputable company and request urgent action to provide, update or verify your information.
If you did not enter a lottery, you cannot win a lottery. There are no email draws or lotteries where tickets are not sold. Legitimate lottery companies will not ask you for a payment before you can have your money. Sun Life, as an insurer, cannot and does not sponsor lotteries.
Contact us if you suspect fraud, believe you have been a target of a scam and/or receive a suspicious email or telephone call from someone that you suspect to be falsely representing Sun Life or if you have shared personal information with a scammer.