{"id":4453,"date":"2022-09-16T07:11:25","date_gmt":"2022-09-16T06:11:25","guid":{"rendered":"https:\/\/blog.alison.com\/?p=4453"},"modified":"2022-09-16T07:11:25","modified_gmt":"2022-09-16T06:11:25","slug":"how-to-recognise-fraud","status":"publish","type":"post","link":"https:\/\/alison.com\/blog\/how-to-recognise-fraud","title":{"rendered":"How to Recognise Fraud"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Alison has issued a warning to the public to watch out for the latest online scams. As a global education platform catering for millions of learners, Alison takes its security seriously and upholds the highest standards in safeguarding learners\u2019 data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cCriminals are constantly looking for new ways to target members of the public and while our users have nothing to worry about, it is useful to know some of their tactics and how you can spot a scam,\u201d <\/span><span style=\"font-weight: 400;\">said a company spokesperson.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In one recent instance relating to Alison, the company was informed of a syndicate posing as an Alison <\/span><span style=\"font-weight: 400;\">HR manager and using the email address <\/span><a href=\"mailto:ALISONHEADQUARTERS@mail.com\"><span style=\"font-weight: 400;\">ALISONHEADQUARTERS@mail.com<\/span><\/a> <span style=\"font-weight: 400;\">regarding a Data Entry position. These criminals also contacted an individual by phone. \u201cThey informed their target that their r\u00e9sum\u00e9 and contact information had been found on a job portal like <\/span><i><span style=\"font-weight: 400;\">Indeed<\/span><\/i><span style=\"font-weight: 400;\"> and set up an interview. Their scam is made more convincing as they plan these interviews using Telegram or Skype. They then <\/span><span style=\"font-weight: 400;\">tried to get this individual to pay for the training they would receive for the falsely advertised position.\u201d<\/span><\/p>\n<h2><b>Signs it Could Be Fraud<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It can be difficult to recognise fraud at work. Take a look at a few ways fraudsters can try to trick you.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><strong>Phishing<\/strong><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Phishing is a criminal tactic where scammers send emails pretending to be from a legitimate company, sometimes a company you may know, or a government institution. They go as far as creating an email address, letterhead, phone number, and website all to appear credible. Here, they attempt to trick the reader into making payments and sharing personal information like pin numbers or credit card numbers.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><strong>Smishing<\/strong><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This is a technique where criminals send text messages to try and get individuals to reveal their personal data. They do this by sending you a malicious link to click on to execute their scam.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These attempts are commonplace and by using the Alison name, may seem true. However, we urge you to be mindful of these fraudulent operations, and take precautions if you suspect something is \u201coff\u201d.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4465\" src=\"https:\/\/blog.alison.com\/wp-content\/uploads\/2022\/09\/Blog_header_hacker-300x188.png\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker-300x188.png 300w, https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker-400x250.png 400w, https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker.png 422w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2><b>How to Recognise Legitimate Alison Communication<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It\u2019s important to remember that online fraud scams <\/span><i><span style=\"font-weight: 400;\">seem <\/span><\/i><span style=\"font-weight: 400;\">legitimate. Be sure to double check all communication received from Alison. You can recognise and verify our communication through the following methods:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">All our emails use this domain name: @alison.com\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Open positions are available on our website: <\/span><a href=\"https:\/\/alison.com\/about\/careers\"><span style=\"font-weight: 400;\">https:\/\/alison.com\/about\/careers<\/span><\/a><\/li>\n<li><span style=\"font-weight: 400;\">Users can check a contact\u2019s ID with the support team on the live chat or via email: <\/span><span style=\"font-weight: 400;\">support@alison.com<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Don&#8217;t rely on branding elements to judge the safety of an email.<\/span><\/p>\n<h2><b>How to Handle Phishing Emails<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The email source may look legitimate and from a source you normally engage with, but if you are suspicious, do the following:<\/span><\/p>\n<ul>\n<li><strong>Do not reply to the email.<\/strong><span style=\"font-weight: 400;\"> Instead, compose a new email and send it to the company (<\/span><a href=\"mailto:support@alison.com\"><span style=\"font-weight: 400;\">support@alison.com<\/span><\/a><span style=\"font-weight: 400;\">) <\/span><span style=\"font-weight: 400;\">to investigate the contents of the email you have received.<\/span><\/li>\n<li><strong>Report it.<\/strong> <span style=\"font-weight: 400;\">If your email service provider includes a button to report phish, use it.<\/span><\/li>\n<li><strong>Remove it.<\/strong><span style=\"font-weight: 400;\"> Delete the message from your inbox.<\/span><\/li>\n<\/ul>\n<h2><b>Tips to Protect Yourself from Fraud<\/b><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4468\" src=\"https:\/\/blog.alison.com\/wp-content\/uploads\/2022\/09\/Blog_header_hacker_2-300x188.png\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker_2-300x188.png 300w, https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker_2-400x250.png 400w, https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_hacker_2.png 422w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Fraudsters will always come up with new ways to try and scam you. Read the below tips to protect yourself from falling victim to online fraud:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Beware phishing scams<\/strong><b>.<\/b><span style=\"font-weight: 400;\"> Phishing scams utilise fraudulent (yet believable emails) and websites to lure individuals into disclosing their private information. Do not click or open links and pop-ups from unfamiliar sources.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Keep private information private.<\/strong><span style=\"font-weight: 400;\"> Be mindful of how much of your personal information you share online.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Surf safely.<\/strong><span style=\"font-weight: 400;\"> Use trusted and secure trusted networks to complete any financial transactions. Criminals have found a way to intercept wireless networks and phish your personal information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Never share personal information online.<\/strong><span style=\"font-weight: 400;\"> Fraudsters attempt to \u201ccatch\u201d you by saying there is something wrong with your account. They will require you to verify personal information and use this information to gain access to your account.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Don\u2019t act under pressure.<\/strong><span style=\"font-weight: 400;\"> Fraudsters attempt to pressure you to act quickly, without giving you much time to think. They do this by threatening closure of accounts, dropping legal terms, or that you will lose something if you don\u2019t act immediately. Take time to double check everything before giving out information or saying \u201cyes\u201d to things online.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Don\u2019t send money.<\/strong><span style=\"font-weight: 400;\"> Scammers also insist on you making payments using money transfer, deposit money, a gift card, or sending a check\/cheque.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Fraud is a serious issue. Knowledge is your best weapon. If you see something suspicious, report it.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alison has issued a warning to the public to watch out for the latest online scams. As a global education platform catering for millions of learners, Alison takes its security seriously and upholds the highest standards in safeguarding learners\u2019 data. \u201cCriminals are constantly looking for new ways to target members of the public and while [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":4454,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-4453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alison-in-action","match-height"],"featured_image_src":"https:\/\/alison.com\/blog\/wp-content\/uploads\/2022\/09\/Blog_header_fraud1.png","featured_category":"Alison in Action","_links":{"self":[{"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/posts\/4453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/comments?post=4453"}],"version-history":[{"count":6,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/posts\/4453\/revisions"}],"predecessor-version":[{"id":4470,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/posts\/4453\/revisions\/4470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/media\/4454"}],"wp:attachment":[{"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/media?parent=4453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/categories?post=4453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alison.com\/blog\/wp-json\/wp\/v2\/tags?post=4453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}