We take online security seriously at iSTOX. Here are some tips to protect your identity and data:
- Check The Website Address
Before entering your iSTOX username and password, you should always ensure that you are on a website that belongs to the iSTOX platform. You can verify this by checking the website address, which should indicate iSTOX.com.
This is important because cyber criminals and scammers sometimes create lookalike versions of legitimate websites to get unsuspecting users to reveal their usernames and passwords.
You can also verify the authenticity of ISTOX's website by clicking on the lock icon in the website address, and then clicking certificate.
- Security Certificate Warning
If you see a warning like the one below, do NOT interact further with the website. Instead, contact us at email@example.com.
- Monitor iSTOX Account Activity
Monitor your iSTOX account closely and report any suspicious account activity. If you suspect your iSTOX account has been compromised, change your password and notify us immediately.
- Other Security Measures Include:
- Install anti-virus software and firewall software on your computers and digital devices and ensure these are updated regularly
- Update your operating system regularly
- Encrypt confidential information or personal information on email network to protect sensitive information
- Avoid using public computers or unsecured public Wi-Fi networks when accessing you iSTOX account
Identifying And Preventing Phishing Attacks
Phishing is a method by which cybercriminals attempt to trick potential victims into divulging sensitive information, such as account names, passwords and bank account information. Phishing attempts can occur via email, phone calls, instant messages, social media platforms and more. Cybercriminals may attempt to impersonate family members, friends, government officials or even iSTOX personnel
Here are some tips to protect yourself from phishing attacks:
- Check The Email Address
Check if you know the sender of any given email and verify the originating email address is correct. Phishing attacks are often sent from email addresses that are different from the domain name of the company or organization the sender is passing him or herself off as. In some instances, they may create and use domain names that are similar but not identical to the legitimate one (e.g. 1STOX.com rather than iSTOX.com).
- Pay Attention To The Language
Pay attention to the language used by the sender. Because many phishing attacks originate overseas, English may not be the writer’s first language. As a result, phishing emails, instant messages, and other communications may contain grammatical or spelling errors.
- Appeals To Emotions
Pay close attention to the tone of the email. Cybercriminals often use methods like the promise of financial rewards or the threat of serious consequences in order to emotionally manipulate victims into doing their bidding.
- Be Careful Of Embedded Links And Attachments
Phishing emails very often require the recipients to take further actions, such as clicking on links or attachments.
Verify any embedded link before you click on it. By moving your mouse cursor over it, you can check the authenticity of embedded links. As an alternative, you may want to access iSTOX sites by manually typing the correct web address into your browser’s address bar.
You should also be careful of attachments, which may contain viruses, spy software, and other malware. Many of these will have dangerous file extensions, such as ‘.exe’, but do be aware that they can also be packaged in other ways as well, such as ‘.zip’ or ‘.pdf’. You should avoid opening attachments you suspect may be illegitimate and you should always run a malware scan on any attachments you do open using your anti-virus software.
If you receive a phishing email or other message that purports to come from iSTOX, please contact us at firstname.lastname@example.org.
NOTE: Please DO NOT forward the suspicious email on to iSTOX or anyone else