Protecting Your Personal Information in a Digital World

Suzi Francis |

Here at PRI, we take your Personal Identifiable Information (PII) seriously. Cybersecurity is also a top priority, which is why our team regularly trains to stay informed about emerging threats. With the growing number of cyber-attacks, we want to share a few simple ways you can help protect yourself from common scams and unwanted messages. 

You may have heard terms such as phishing, spoofing, ransomware, or malware in the news or online. Below is a simple explanation of what these mean and how to recognize them. 

Phishing – A scam where someone pretends to be a trusted source, such as your bank, employer, or a well-known company, in order to trick you into providing sensitive information. 

How it works: 
You may receive an email or text message claiming there is an urgent issue, such as a locked bank account or an unpaid toll (EZ-Pass messages have recently become common). The message includes a link that leads to a fake website designed to collect personal information such as passwords, Social Security numbers, or bank and credit card details. 

Phishing messages often use urgent language like “Act now” or “Immediate action required” to create panic. These scams can be harder to verify in text messages because links are more difficult to inspect. If you receive a suspicious text message, it is best to delete it and mark it as spam through your phone carrier. 

For suspicious emails, the SLAM method is a helpful tool for protecting your PII. 

SLAM Method 

Sender – Look closely at the sender’s email address. Does it appear legitimate? Are there misspellings or unusual domains? 

Links – Hover over links before clicking. Do they lead to the company’s real website? If unsure, visit the company’s website directly through a search engine instead of using the link provided. 

Attachments – Consider whether the attachment makes sense in the context of the message. Attachments can contain malware or viruses that download when opened. 

Message – Review the tone and content. Does the email create urgency? Are there spelling or grammar mistakes? Is it asking for personal information? 

Using the SLAM method is a simple step toward protecting your personal information. 

Spoofing – When a scammer pretends to be someone else so a message, phone call, or website appears to come from a trusted source. 

How it works: 
Common forms of spoofing include email, caller ID, and websites. 

Email – You may receive an email that appears to come from someone you know, but the address or tone is slightly different. If you are unsure, contact the person through another method to confirm. 

Caller ID – A phone call may appear to come from someone you know, but the number is unfamiliar. The caller may attempt to convince you they are that person or calling on their behalf. 

With the rise of AI tools, scammers may even use voice technology to imitate someone you know. If you receive an unusual call or request, hang up and call the person back using the number you already have. Some families also establish a shared code word or phrase to confirm real emergencies. 

Websites – You may see an advertisement on social media, a game, or another website and click the link, which leads to a fake site designed to look legitimate. This tactic is sometimes called malvertising, where malicious ads spread malware. 

Ransomware – Malicious software that locks or encrypts your files and demands payment to restore access. 

How it works: 
Ransomware is often delivered through phishing emails or malicious links. Once installed, it can encrypt files and prevent access to your system. The attacker then demands payment, often in cryptocurrency, and may threaten to delete or release the data if the ransom is not paid. 

If this happens, do not pay the ransom and contact law enforcement. 

Malware – A general term for malicious software designed to damage systems, steal data, or disrupt computer operations. 

How it works: 
Malware can spread through phishing emails, malicious links, downloads, or infected attachments. While ransomware is designed specifically to demand payment, malware can have many goals, including stealing information, damaging files, or secretly monitoring activity. 

We understand that cybersecurity can feel overwhelming at times, but small steps can make a big difference. Keeping antivirus software updated and installing regular system updates are important ways to protect your devices. 

If you ever have questions about cybersecurity or receive a message that seems suspicious, please call us at 215-997-5700. We are always happy to help.