- Ripped off by a new car dealer on warranties
- Denied funds by a bank unless we come back to Canada in person,
- Got dissed on complaints by three online companies,
- Had credit cards compromised twice.
- Along with a series of AI-based dangerous fraud attempts as I applied for work
| Clker.com |
ASK THE DRAGON: So, I asked AI for some thoughts on how to best deal with all the above and beyond. What follows is basically Perplexity AI's respnnse with my added comments in italics. The sources Perplexity took material from are, all things considered, not bad, although the focus was on more advice rather thatn evidence-based protocols and "rules," and many are relatively "light weight." Nonetheless, the general perspectives seem to be relatively consistent. And, as always, AI "sins" more by omission than by commission!
Worldview and perspectives:
- AI makes phishing and social engineering messages highly personalized, including realistic emails, texts, and websites that mimic banks, brokerages, and government agencies. (norton+1)
- Deepfakes and voice cloning are being used for “grandparent” scams, fake kidnapping/extortion calls, and CEO style payment requests, where a cloned voice or video urges urgent action. (jpmorgan+1)
- Deepfake video and face/voice spoofing can bypass some basic biometric and video ID checks, feeding both classic identity theft and fraudulent benefit or loan applications. (fcnb+1)
- Enable multi factor authentication (MFA) on every important account (email, banking, brokerage, password manager, government logins), using an authenticator app or hardware key rather than SMS wherever possible. (hefcu+1)
- Use a reputable password manager and make all passwords long, unique, and randomly generated; this sharply reduces reuse based account takeovers. (cloudeagle+1)
- Keep operating systems, browsers, and security software fully updated and use a modern security suite that includes phishing and malicious site blocking. (hefcu+1)
- Establish family verification protocols: a shared passphrase or question that must be used on any urgent money or data request by phone, text, or video, even if the voice/face seems familiar. (aba+1)
- For any out of pattern request (wire transfer, gift cards, changing banking info), always verify through an independent channel: hang up and call back on a known number or in person if feasible. (acrisure+1)
- Train family members to slow down when confronted with emotional urgency (crisis, law enforcement threats, “act now or lose everything”) and treat that urgency itself as a red flag.cybersecurity. (yale+1)
- Limit public sharing of birth dates, addresses, high resolution photos, and voice/video clips that make cloning easier; tighten social media privacy settings to restrict data scraping. (proof+1)
- Turn on bank, credit card, and brokerage alerts for new payees, large transfers, logins from new devices, and card not present transactions; many institutions now use AI to flag anomalous activity in real time. (mastercard+1)
- Use an identity monitoring / dark web alert service (from a bank, insurer, or specialist provider) that watches for breached credentials and new account fraud in your name. (id+1)
- Prioritize your “crown jewels”: primary email, tax SSA/IRS accounts, bank/brokerage, and password manager; add app based MFA and review recovery options on each this week. (cloudeagle+1)
- Run a quick “family safety briefing” (spouse, adult children, key contacts) to set a code phrase, document the callback numbers you trust, and agree that no one moves money on the basis of a single urgent message or call. (aba+1)
- Ask your financial institutions and any identity protection provider you use which AI enhanced fraud detection and alert tools they already offer, and enable the most conservative settings that still fit your lifestyle. (id+1)
A. Use multi-factor authentication system
B. Use a password manager
C. Use independent channels in verifying requests and queries
D. Turn on alerts (banks, credit cards, etc.)
E. Use an identity monitoring service with dark web alert functions
F. Other recommended actions (not mentioned above)
a. Be part of a team, if possible, or at least have one trusted connection to consult with.
b. Have legal consultation and backup available when necessary
c. Have both eCopies and hardcopies securely filed.
d. Have updated wills and key connections/beneficiaries oriented to their respective roles.
e. Have or at least know a good tax accountant.
f. Continually take training/orientation courses—on most anything!
g. Be at least a competent (not necessarily enthusiastic), informed user of AI!
No comments:
Post a Comment