Internode Blog

How to spot scams

Tuesday, September 21st, 2021 by

So far this year, over $190 million has been lost to scams and hoaxes. The most common method of attack is a practice called Phishing.

Not to be confused with the leisurely pastime of catching fish, “phishing” works by luring people to give out their important personal information, such as account passwords or payment details, to use in fraud and theft.

The typically done by pretending to be a trusted, well-known company in an attempt to trick you into supplying personal information, visiting fraudulent websites or installing malicious software on your devices.

We’ve put together some handy advice to help you stay protected.

(more…)

Are you internet awesome?

Friday, September 13th, 2019 by

Digital safety can be a tricky subject to tackle, especially with kids. We all know how important it is to stay safe online, but when it comes to making a game plan for how to introduce basic digital safety to our kids, many of us may be left scratching our heads on where to start! After all, the subject is a little more complicated than the good old-fashioned “look left-right-left” when crossing the road.

Fortunately, you don’t have to be a digital whiz to help young ones learn how to stay safe on the web. Google’s Be Internet Awesome program gives you access to a range of resources that will help teach the kids how to use the internet safely. If you’ve got young ones who are ready to start exploring the internet, this program is the perfect way to get started!

(more…)

Avoid phishing scams with these tips from Internode

Wednesday, February 27th, 2019 by

Over the years, there’s been a significant increase in the number of emails impersonating Internode, which may contain fraudulent links or attachments. These types of scam emails usually attempt to steal your Internode account information or credit card details, which is known as “phishing”.

Here’s some info to help you avoid being hooked by these phishing scams.

If you receive a suspicious email

  • Do not reply to the email.
  • Do not call any phone numbers in the email.
  • Do not click any links or open any attachments.
  • Just report, then delete.

(more…)

Older Posts »