TITLE

PAYING BILLS ONLINE--SAFELY

PUB. DATE
July 2007
SOURCE
Consumer Reports;Jul2007, Vol. 72 Issue 7, p7
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers advice on how to safely pay bills online. The article recommends that consumers pay through their bank rather than a third-party bill-paying service or the biller's web site. Consumers should create a fraud resistant password for online banking and bill-paying. Consumers should not click on web links embedded in any e-mail request for online banking information.
ACCESSION #
25322493

 

Related Articles

  • Scared of identity thieves? Quinn, Jane Bryant // Good Housekeeping;Feb2006, Vol. 242 Issue 2, p92 

    The article offers information on how to prevent identity theft. It advises to rip financial records before disposing them and destroy the blank checks that come with solicitations for loans and credit cards. It is also important to take everything in the wallet that has the number printed on it...

  • Be Cyber Careful. Mathis, Diana // Utah Valley Magazine;Jan/Feb2016, Vol. 17 Issue 1, p94 

    The article offers several tips to prevent Internet fraud and identity theft. These tips include creating a complicated password as the most common type of identity fraud involves someone the victim knows, checking one's online statement and account activity regularly, and using the pascode lock...

  • Field guide to passwords.  // Consumer Reports;Jul2014, Vol. 79 Issue 7, p19 

    The article offers information on creating computer passwords that are complex enough to protect information but easy for the user to remember. Topics include warnings against simple number sequences or words as passwords as well as against using one's name and birthday, the disadvantages of...

  • E-Mail: How Did We Survive Without It? Imsdahl, Shane // Supply House Times;Oct2005, Vol. 48 Issue 8, p62 

    Discusses how small businesses can protect their e-mail system as a valuable business tool. Best practice for avoiding e-mail viruses; Use of spam filters to catch legitimate e-mails; Best defense against phishing.

  • Spam Wars: The Battle of the Formbots. Breeding, Marshall // Computers in Libraries;Jan2007, Vol. 27 Issue 1, p32 

    The article discusses threats to Internet security, as well as guidelines for protecting computer systems from such threats. Spams have become a tool for phishing and identity theft, causing economic and personal damage to its victims. Advanced strategies used by spammers for fraudulent...

  • IRS, Security Summit Partners, Remind Taxpayers to Protect Themselves online.  // Employee Plans News;2016, Issue 13, p1 

    The article offers information on the reminder made by the U.S. Internal Revenue Service (IRS), the states and the tax industry for taxpayers to protect themselves online and to help fight against identity theft. It discusses some of the best practices that need to follow by taxpayers to protect...

  • Avoiding Identity Theft.  // Native American Times;12/9/2016, p1 

    The article provides tips to prevent identity theft as suggested by the U.S. Federal Trade Commission, which includes physical locking of financial documents at home, prompt removal of mails from mail boxes, and using strong passwords for laptop, card, and bank accounts.

  • IRS, Partners Urge Strong Passwords Help Protect Identities at Tax Time and Beyond.  // Employee Plans News;2016, Issue 13, p1 

    The article reports on the advice of U.S. Internal Revenue Services (IRS) and its partners to taxpayers to have strong passwords to be protected from identity theft. Topics mentioned include the role of passwords as defense from hackers, the launch of the public awareness campaign, and the basic...

  • STAYING ON GUARD. Romano, Andrew // Newsweek (Atlantic Edition);9/5/2005 (Atlantic Edition), Vol. 146 Issue 10, p45 

    Provides information on how to protect your personal data, and what to do if your identity is stolen. Suggestion for protecting credit information, on what not to do when choosing passwords, and how to keep safe on the computer and Internet; Steps for action to take if information is stolen.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics