It was a great day of friendship and competition at this year’s 20th George Wheeler Cup. The annual event brings together soccer players and families from Natick and Framingham while raising money for four awards given to Framingham and Natick High graduating senior soccer players.
Mark R. Haranas, president and CEO of MutualOne Bank and a MutualOne Charitable Foundation trustee, announced today that the Foundation has awarded $5,000 to help advance the “iPads on a Cart” program introduced last year at Marian High School in Framingham.
The Foundation’s gift will help purchase up to 10 additional classroom Apple iPads to be used by faculty and students for specifically designed lessons and projects as the program enters phase two this year.
“We’re happy to support Marian High School’s efforts to enhance its technology capabilities,” said Haranas. “There’s no question that it is a definite plus for today’s students.”
It was a beautiful day as neighbors, friends, and family gathered for Natick Days, a “festival of entertainment that celebrates our community.” During the event, visitors to our booth picked up gifts and goodies, as well as met Mo, the MutualOne Bank mascot!
Robert P. Lamprey, chairman of the MutualOne Charitable Foundation, has announced a $5,000 grant from the Foundation to Homeowners Options for Massachusetts Elders (HOME).
The grant will support the organization’s outreach work and prevention initiatives designed to help low-income elders in our area who are experiencing difficulties and dire threats to their ability to maintain themselves long-term in their homes and communities.
“Helping elders successfully age-in-place and maintain their independence and self-reliance is an important part of building community,” said Lamprey. “The MutualOne Charitable Foundation is pleased to support HOME’s efforts.”
Steven M. Sousa, executive vice president and COO of MutualOne Bank and a MutualOne Charitable Foundation trustee, announced today that the Foundation has awarded $1,000 to American Veterans (AMVETS) Post 79 in Natick for its new 9-11 Memorial. The funds will provide for the addition of seven lights in memory of the seven T.J. Maxx employees who died on 9-11 and a bell to honor the 343 firefighters lost in the tragedy.
“We were proud to support the Post’s 9-11 Memorial plans,” said Sousa. “September 11th is a date that will always resonate in our minds and in our hearts, no matter how much time passes.”
Social engineering refers to the methods attackers use to manipulate people into sharing sensitive information, or taking an action, such as downloading a file. Sometimes a social engineer is able to rely solely on information posted online or will sometimes interact with the victim to persuade the victim to share details or perform an action.
Information posted online can seem harmless, until you think about how a social engineer could use the same information. By gathering multiple pieces of information from various sources, a cyber criminal could have enough facts about you to craft a very convincing social engineering scam. Think about how these seemingly innocuous details might be valuable to the cyber criminal:
• Posting a picture of your pet might give away your pet’s name, or posting a photo of your car would identify its color. Pet’s name and car color are common security questions.
• Answering a “meme” can give away personally identifiable information (PII) such as your date of birth or other sensitive information, including answers to security questions.
Be careful about how much information you post and think about how the various pieces might be combined for use by a cyber criminal.
The following three common types of persuasion methods highlight different ways social engineers target victims through the Internet.
Tech Support Call Scams
In Tech Support Call Scams the scammer, claiming to work for a well-known software or technology company cold calls victims in an attempt to convince the victim that their computer is at risk of attack, attacking another computer, or is infected with malware, and that only the caller can remediate the problem. In convincing the victim, the scammer often persuades the victim to provide remote access to the victim’s computer. The scammer can then install malware or access sensitive information. In some variations the scammer persuades the victim to pay for unnecessary or fictitious antivirus software or software updates.
In Romance Scams the malicious actors create fake profiles on dating websites and establish relationships with other site members. Once a sense of trust is established, the scammer fabricates an emergency and asks the victim for financial assistance. The scammer generally claims they will repay the victim as soon as the crisis is over, however, if the victim sends money, the scammer will prolong the scam, sometimes stealing thousands of dollars from the victim.
In this scenario, also known as the “Grandparent Scam,” malicious actors use information posted on social media websites by a traveling family member to trick other family members into sending money overseas. Often the scam targets the elderly, who are less likely to realize the information was originally posted online. The scammer will monitor social media websites for people traveling overseas, and then contact the family members, through the Internet or via phone, with a crisis and requesting that money be sent immediately. The scammers rely on all the information users post online about themselves and their trips, in order to convince the family member that they know the traveler and are privy to personal details, and thus should be trusted.
Easy Tips to Protect Yourself from Social Engineering
• Use discretion when posting personal information on social media. This information is a treasure-trove to scammers who will use it to feign trustworthiness.
• Before posting any information, consider: What does this information say about me? How can this information be used against me? Is this information, if combined with other information, harmful?
• Remind friends and family members to exercise the same caution. Request that they remove revealing information about you.
• Verify the identity of anyone who contacts you through different means – do not use the information they provide you.
• Do not send money to people you do not know and trust.