Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »


 

 

 

Close

How satisfied are you with our online help?*

Just these help pages, not phone support or the product itself

0
1
2
3
4
5
Very dissatisfied
Very satisfied

Why did you give this rating?

Anything else you want to tell us about the help?

Phishing websites are fraudulent websites that deceive visitors by mimicking legitimate websites. These websites aim to trick visitors into giving away sensitive information, such as login and financial details.

Recognise and avoid phishing websites

Here are some tips that'll help you recognise and avoid phishing websites:

Check the URL

Check the URL

Phishing websites often imitate URLs to create the illusion that you're on a legitimate website. To check if a website has a legitimate URL, look for slight variations, misspellings, or additional characters in the URL. For example, my0b.com or rnyob.com.

You can also check for the secure HTTPS connection (padlock symbol) and ensure the URL matches your legitimate website.

Examine the website design

Examine the website design

Compare the design and layout of the website with the official website. Look for inconsistencies, such as variations in colours, fonts, logos, or overall design. Phishing websites may have poor-quality graphics, distorted images, or irregularities that indicate a fraudulent copy.

Beware of urgent requests

Beware of urgent requests

Phishing websites and emails often use alarming messages to create a sense of urgency. They may claim your account has been compromised or that immediate action is required. Be cautious of such requests and independently verify the legitimacy of the message through trusted channels, such as your usual method of navigating to your MYOB application or contacting customer support directly.

Be wary of unsolicited emails or messages

Be wary of unsolicited emails or messages

Phishing attempts often begin with unsolicited emails, text messages, or social media messages. Be sceptical of any message that asks for personal or sensitive information, especially if it redirects you to a website. If they give you a link, you can check the URL for where it will take you by hovering over it. Instead of clicking on provided links, manually type the URL of the website you wish to visit into your browser or use bookmarked links.

Trust your intuition

Trust your intuition

If something feels suspicious or too good to be true, it probably is. Trust your instincts and exercise caution when interacting with websites that raise doubts. If you have any concerns about the legitimacy of a website, refrain from providing any personal information and report the suspicious activity to your organisation's IT or security team.

What to do if you suspect you're the victim of a phishing scam

If you believe you have fallen for a phishing attack and suspect that your account may be compromised, it's crucial to take immediate action to protect your information and prevent further damage. Here are the steps you should follow:

  1. Change your passwords: Immediately change the password for the compromised account and any other accounts that share the same or similar passwords. Choose strong, unique passwords that include a combination of letters, numbers, and special characters.
  2. Enable Two-Factor Authentication (2FA): If the compromised account supports two-factor authentication, enable it right away. This adds an extra layer of security by requiring a second verification step, such as a code sent to your mobile device, in addition to your password. Avoid using email as your method of 2FA as using an authenticator app or SMS is more secure.
  3. Check for unauthorised activity: Review your account activity and transaction history to identify any unauthorised access or suspicious activity. Look for unfamiliar login locations, unrecognised transactions, or changes to your account settings.
  4. Contact the service provider: Report the incident to the service provider or the organisation responsible for the compromised account. They can guide you on the specific steps to take and may assist in recovering your account or mitigating any potential damage.
        
Related topics