Online Safety

Following a few simple rules will help to protect you online:

  • Use strong password logins for your devices, as well as any online accounts and services you may use.
  • Keep your devices, programs and operating system up to date to prevent possible exploit attacks.
  • If using a home Wi-Fi network, have a strong password and update it regularly.
  • Avoid doing online banking or other tasks that require personal information when using public computers or Wi-Fi hotspots.
  • Never open email attachments from a source you don’t recognise or are unsure of. Use an email filter to protect yourself from malicious messages.
  • Avoid downloading suspicious files when online.
  • Don’t download applications from third-party download sites or peer-to-peer networks. 

You can also install an anti-virus software program to help protect you from many types of malware. To learn more about anti-virus software visit the Australian Cyber Security Centre.
 

The internet can be a great place for both entertainment and communication, but it is not without potential risk, as cyberbullying, cyberstalking, child exploitation and more have become more prominent.

It is not uncommon for children as young as 5 to be exposed to the internet, and as they grow up, they’ll continue to surf the web, watch online videos, play online games and communicate with others via social media or other apps.

There a number of useful online resources available to help you better understand the possible risks and protect your children.
 

If something doesn’t look or sound right, or if something is too good to be true, it usually is. To help safeguard yourself, you should:

  • Not respond to missed calls or SMS from unknown international numbers.
  • Block any numbers on your phone that you suspect to be a scam call or SMS.
  • If you don’t know the number, let the call go through to voicemail. Then check if the number is from a credible source by searching for the organisation’s official number online before returning the call.
  • Be careful where you share any personal information in an online setting such as social media.
  • Avoid clicking on any unknown links in text messages.
  • Immediately contact your financial institution if you believe you may have lost money to a scam.

To report a scam, you can contact iPrimus directly or make a report to Scamwatch, a division of the Australian Competition and Consumer Commission. You can report the scam to Scamwatch here.   

If you are receiving unwanted sales and marketing calls, you can register your number on the National Do Not Call Register here.

More information about the National Do Not Call Register can be found on their website here.

What are they?

Viruses, worms, Trojans, and bots are all part of a class of software called "malware." Malware is short for "malicious software," also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks.

  • Viruses: A computer virus copies itself into your computer and can spread from one computer to another. Viruses can damage data and software. 
  • Bots: A malicious bot is self-spreading malware designed to infect a host and connect back to another server that acts as a command and control centre for an entire network of compromised devices, creating a "botnet." Bots can include the ability to log keystrokes, gather passwords, capture financial information, launch Denial of Service (DOS) attacks, relay scams, and open backdoors on the infected host.
  • Adware: Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.
  • Ransomware: A type of malware that can threaten to make your private information public, or lock your system, making it unusable. Requires the user to pay a ransom payment to remove.
  • Worms: Worms are similar to viruses but are standalone software and do not require a host program or human help to spread. More advanced worms leverage encryption, wipers, and ransomware technologies to harm their targets.
  • Trojans: A Trojan is a harmful piece of software that looks legitimate. After it is activated, it can cause irritating pop-up windows, change desktops, delete files, steal data, or activate and spread other malware. A Trojan infection is usually caused by opening an email attachment or downloading and running a file from the Internet.
     

Scammers often pretend to be a common business or institution you are familiar with, in order to obtain your personal information, such as financial details or information pertaining to your identity.

Phishing methods used by scammers include:

  • Emails
  • Fake websites
  • Text messages
  • Phone calls
  • Instant messaging services
  • Social media

These are designed to deceive you into giving out your private and confidential information. iPrimus will never ask you for your personal or private information via an email or SMS.

It’s not always easy to spot a scammer, but you should look out for these signs;

  • Generic greetings – If you have an account, they should know your name.
  • Poor spelling or grammar.
  • An ‘urgent’ request for information – Most companies will not send you an email asking for passwords, credit card information, or tax numbers, nor will they send you a link from which you need to login.
  • Deals, Offers or Prizes (Holidays, cash prizes, etc.) – If an offer comes with a request for personal information, a link to claim your prize, or an attachment to download, it’s a phishing scam. It’s like the old saying “if it seems too good to be true, it probably is.”
  • Scare Tactics – Sayings like “your account has been compromised”, “A warrant has been issued for your arrest” and other threats.
  • Attachments or Click Links - If something makes you suspicious or doesn’t look right, do not open it and simply delete. To report a scam, you can contact iPrimus directly or make a report to Scamwatch here.   
     

With scammers becoming more sophisticated, calls and SMS can sometimes appear to originate from a credible source such as a government agency or other well-known organisations.

Go with your first instinct and never respond to a request for personal or account information, demand for immediate payment or remote access to a device.

Although these calls and SMS’ can appear to be genuine, credible sources generally don’t ask for this type of information over the phone or in an SMS, so it is important to be vigilant. Scammers may also:

  • Claim that you have won a prize.
  • Use a well-known logo or send an SMS that appears to be legitimate.
  • Call or SMS multiple times.
  • Use a recorded message to urge you to return the call.
  • Add a link in an SMS to get more information.