The leakage and trafficking of personal information have become an important part of the black industrial chain of fraud crimes. Since many telecommunications network fraud methods require obtaining the victim's private information as a prerequisite and necessary step, it is crucial for the general public to protect their personal information and prevent privacy leakage from the source to avoid property losses.
Response methods
① Protect personal identity information. Do not provide important information such as ID number, work unit, home address, position, etc. to strangers unless necessary. Do not save ID photos or numbers on your phone.
② Keep personal account information well. Be careful to verify the authenticity of the domain name before entering important information such as account number, mobile phone number, payment password, etc. on relevant websites. Do not click on suspicious links, do not connect to wireless networks of unknown origin, do not scan QR codes obtained through informal channels, and beware of phishing traps. .
Never assume that it is not a crime if you are not directly involved in the fraud. Anyone who knowingly sells bank cards or mobile phone cards to provide convenience to others while knowing that others are using information networks to commit fraud is suspected of committing an illegal crime and will be held criminally responsible if the circumstances are serious.
Coping methods
The general public must remain vigilant, do not trust others, do not seek small profits, and must never sell, transfer, rent, sublet, lend or purchase bank cards or payment accounts. (WeChat, Alipay, etc.), so as not to provide criminals with "committing tools". Otherwise, all non-counter business of bank accounts and payment accounts will be suspended within 5 years. It will also leave a stain on personal credit report and affect loan processing and other services.
*If you discover criminal activities such as selling, renting, or lending phone cards or bank cards, you must report it to the public security agency in a timely manner.
Some cases of telecommunications network fraud reflect obvious loopholes in the bank account management of some people. Therefore, improving the security of bank accounts and "locking" their accounts is a key part of risk prevention.
Countermeasures
① Set more complex passwords for bank cards, online banking, and mobile banking;
② Do not set passwords related to online banking on any other websites. The same username and password for banks, mobile banking, etc.;
③ Do not disclose or forward SMS verification codes and other forms of dynamic passwords to anyone.
Victims’ lack of financial knowledge or weak risk awareness is the direct reason why most telecommunications network frauds ultimately succeed. Therefore, improving the awareness of financial products and services and self-protection capabilities are the key to preventing fraud and losses. Core response strategies.
Especially in recent years, the victims of telecommunications and network fraud have become more widespread, gradually spreading from the elderly and less educated groups to young and middle-aged people, highly educated, and high-income people. Strengthening financial knowledge learning has become a priority for everyone. A required course for everyone.
Coping methods
① The public should pay close attention to media reports and fraud cases exposed on the Internet, understand the recent modus operandi, and remind family and friends to be more vigilant.
② You should carefully read and keep in mind the safety reminder information pushed by telecom operators through SMS, as well as the risk prevention points released by the public security organs from time to time through websites and public accounts.
Although telecommunication network fraud is pervasive and difficult to distinguish between true and false, as long as the public remains vigilant, develops good payment habits, and controls the last step of external transfers and remittances, capital losses can still be effectively avoided.
Coping methods
① Receive transfer requests from acquaintances via SMS, WeChat, Weibo, QQ, email, voice, etc., or ask for important information such as bank cards and online banking passwords When requesting remittance, you must verify and confirm by phone;
② When strangers or "acquaintances" who have lost contact for a long time request remittance, you must be cautious and seek verification from multiple parties, and promptly report to the public security organs, banks, and telecommunications operators when encountering suspicious circumstances. Consult other institutions;
③ If you really need to transfer money to the other party, you should try to choose the next day payment method and verify it again afterwards. If there are any abnormalities, apply for cancellation in a timely manner;
④ With mobile Consumers with payment habits should choose payment products with higher security and download and install genuine application software;
⑤ Avoid storing too many funds in bank cards bound to mobile payment software in order to disperse and lock them risk.