PerfectOpps Frequently Asked Questions (FAQ)
1. How do I Protect my Computer?
Use anti-virus software and keep it up-to-date
Â If you haven't installed anti-virus software on your computer, do it now. Anti-virus software can detect many â€” but not all â€” forms of malicious software before they have a chance to affect your computer. When you purchase anti-virus software, look for one that includes anti-spyware. Most anti-virus software can automatically download updates for you. Check to make sure your software is downloading updates correctly.
Keep all your software up-to-date
You can prevent many problems by regularly checking for and installing updates for your programs, including your operating system, browser, messaging software, and other software. Many programs include a feature that automatically checks for updates. Be wary of clicking links in emails claiming to have updates for your software; it is safer to type the address of the web site into your browserâ€™s Address bar to visit the site directly.
Check your security settings
Most operating systems (such as Windows XP) have a built-in firewall and other safeguards to prevent unauthorized access to your computer. Check your operating system to make sure it's set up so that your computer is protected. Install any security updates or patches for your operating system promptly.
Be careful opening email attachments
Consider turning off the feature in your email programs that automatically opens attachments. If you receive an attachment you aren't expecting, do not open it. Before you open any email attachment â€” even if it's from someone you trust â€” scan it using anti-virus software.
Don't install unfamiliar programs
Think carefully before installing or running new software, such as freeware or shareware programs available online. Only download software from a source you trust. Do not install software if you cannot verify that it's from a trusted source. Make sure you know what the software will do and how it will affect your computer. Malicious software (like viruses and spyware) often masquerade as legitimate and even useful programs. For example, you might be tempted to download a program that claims to keep your computer clock synchronized with an official clock. But if that program contains adware or spyware, it could also display advertising pop-ups whenever you're online or keep track of where you go on the Internet.
Be wary of pop-up and email warnings
Don't believe every warning you read â€” especially pop-up warnings that you see while you're surfing the Web. Unscrupulous companies use pop-up ads to display false warnings about your computer. Ignore them.
Do NOT click any button in the pop-up (such as a "Close" or "No" button) or the Close box that may appear in the upper-right corner of the pop-up. Closing a pop-up in that way might actually install a virus or other malicious software on your computer. To close a pop-up ad, press Ctrl-W (if you're using a Windows computer) or Command-W (on a Mac computer). You may receive an email warning that claims to be from a computer "expert" warning you of a virus. These are usually hoaxes. Do not follow the steps described in any email unless you're sure the threat is real.
2. How can I recognize a phishing email?
If you receive an email from a web site or company urging you to provide confidential information, such as a password or Social Security number, you might be the target of a phishing scam. The tips below can help you avoid being taken in by phishers.
Important: To be completely safe from phishers, do not click links in emails. If in doubt, close your browser, reopen it, and type the web address for the site you want to visit directly into the Address bar.
You should consider several factors when deciding whether or not an email is authentic. This example email has some telltale signs of a phisher at work:
1. Unofficial "From" address: Look out for a sender's email address that is similar to, but not the same as, a company's official email address. Fraudsters often sign up for free email accounts with company names in them (such as "email@example.com"). These email addresses are meant to fool you.
Note: Fraudsters can forge the "From" address to look like a legitimate corporate address. Because of this, the "From" address is just one factor to consider when deciding if an email is trustworthy.
2. Urgent action required: Fraudsters often include urgent "calls to action" to try to get you to react immediately. Be wary of emails containing phrases like "your account will be closed," "your account has been compromised," or "urgent action required." The fraudster is taking advantage of your concern to trick you into providing confidential information.
Note: Legitimate companies will never ask you to verify or provide confidential or financial information in an unsolicited email.
3. Generic greeting: Fraudsters often send thousands of phishing emails at one time. They may have your email address, but they seldom have your name. Be skeptical of an email sent with a generic greeting such as "Dear Customer" or "Dear Member."
Note: Sophisticated fraudsters can get your name from public records and target you directly, so even if an email includes your name, it may not be authentic. Whether an email addresses you generically or by name is just one factor to consider when deciding if an email is trustworthy.
4. Link to a fake web site: To trick you into disclosing your user name and password, fraudsters often include a link to a fake web site that looks like (sometimes exactly like) the sign-in page of a legitimate web site. Just because a site includes a company's logo or looks like the real page doesn't mean it is! Logos and the appearance of legitimate web sites are easy to copy. In the email, look out for:
Links containing an official company name, but in the wrong location. For example: "http://www.perfectopps.com:login&mode=secure&ib35" is a fake address that doesn't go to a real PerfectOpps! web site. A real PerfectOpps! web address has a forward slash ("/") after "perfectopps.com" â€” for example, "http://www.perfectopps.com/" or "https://login.perfectopps.com/."
Masked links that look like they go to the real web site, but don't. In the sample email, the link says "mybusiness.perfectopps.com," but if you place your mouse pointer over the link, you can see the real address (in the yellow box) â€” "http://188.8.131.52/perfectopps/accountupdate." You usually can see a link's real destination by placing your mouse pointer over it.
Â And look for these other indicators that an email might not be trustworthy:
Spelling errors, poor grammar, or inferior graphics.
Requests for personal information such as your password, Tax Registration Number, or bank account or credit card number. Legitimate companies will never ask you to verify or provide confidential information in an unsolicited email.
Attachments (which might contain viruses or keystroke loggers, which record what you type).
It can be very difficult to discern a phishing email from the real thing. Remember that if you have any doubt about the authenticity of a web site, close your web browser, reopen it, and type the web site address in your browser's Address bar.
3. How do I choose my password?
Your password is more than just a key to your online account. If your password falls into the wrong hands, someone can easily impersonate you while online, sign your name to online service agreements or contracts, engage in transactions, or change your account information. So, choose your password carefully and then keep it safe from others.
A password is like a toothbrush: Choose a good one and don't share it. A PerfectOpps! password can be any length, and can contain spaces, symbols, or numbers. With so many options, you should be able to come up with a password that's easy for you to remember but impossible for someone else to figure out. A password is a secret that only you should know.
Here are some tips for choosing a strong password â€” one that is difficult to guess.
Choose a password you'll remember. It should be memorable for you (so that you don't have to write it down or leave it in the open), but difficult for others to guess.
Avoid using a word. Avoid a complete word from a dictionary (English or otherwise) or a name.
Use at least 7 characters. The more characters your password contains, the harder it is for someone to guess it. A long but simple password can be safer than a short, complex one â€” and often easier to remember.
Use a combination of capital and lowercase letters, numbers, and standard symbols (! @ # $ % ^ & *). Your PerfectOpps! password is case-sensitive, which means that a capital letter A is different from a lowercase a.
Don't use personal information that someone could easily figure out. Avoid a password based on information easily obtained about you (like your birthday, your child or pet's name, phone number, license plate number, employer, school name, automobile brand, or street name). Don't use a password you already use for another account, such as your bank account PIN. And don't use your PerfectOpps! ID (or other user name) in any form (such as reversed, capitalized, or doubled).
Avoid the obvious. Don't make it easy for attackers by repeating a digit or letter (like "77777" or "PPPPPP") or any other common sequence of characters (like "56789"). Stay away from obvious passwords such as "name" or "private." When you change your password, change several characters; don't just append a number like "7" to the end. And make sure anyone watching you enter your password can't guess it as you type (such as a password typed using a single hand, like "qwerty").
Put a new spin on a familiar phrase. Pick a favorite phrase or lyric for your password. To shorten it, substitute letters with a number or a standard symbol or remove vowels. For example, "Shellysgirl" can be made into "$h3lly$8irl." Shorten "three movie tickets" to "3movieTix," or combine "Fry" and "Rice" into "fRy!r!c3"
If you use a password generator, be careful. Make sure you can identify and trust the creator of a password management or generator program. Never share any personal information unless you trust the company or person you're working with. Online password-generator programs can help you create a random password that is generally harder to crack but also more difficult to remember.
4. How do I safeguard my password?
Choosing a strong password is just one part of protecting your PerfectOpps! account. You should also follow these tips to keep it safe:
Your PerfectOpps! ID and password are confidential information. A PerfectOpps! employee will never ask you for your password in an unsolicited phone call or email. Do not respond to any message that asks for your password.
Do not write your password down. If you must write it down, keep it safe away in a place only you can access. Treat it as if it were cash.
Verify your PerfectOpps! account information. From time to time, make sure your information is accurate and that no one has changed your data.
Use care with automatic sign-in. If you check Remember Me when you sign in to PerfectOpps!, you're still signed in even after you close your browser.
This feature can be a convenience for you: When you return to PerfectOpps!, you don't have to re-enter your password. (If you're away from your computer for a while, you may be asked to re-enter your password.)
Do not check the Remember Me box if you use a shared computer.
To change the setting of this feature, click the Sign out link at the top of most PerfectOpps! pages, and then sign in again, but do not check the Remember Me.
Read the fine print. Before saving your password on any browser, plug-in, or program, thoroughly read the security documentation for that program or service. Depending on the program, your passwords may be available to anyone who uses that computer.
5. How Do I Protect My Kids Online?
Learn about the Web
If your kids are more familiar with the Web than you are, a little research will pay off when it's time to talk to them about online safety. Many public libraries and community centers offer sessions about using the Web, searching for information, and the sorts of places you â€” and your kids â€” can visit online (like web sites, chat rooms, and email).
Keep your child's computer in sight
Place the computer in a public area of your home so you can keep an eye on your child's online activities. The living room, kitchen, or wherever it's easiest to monitor your child's computer use will do.
Read more about keeping your family safe online
Use parental control software
Many parents find that adding blocking and filtering programs to regular supervision provides additional peace of mind. Check out the control features of your online service or ISP. Don't let your kids help you set up the filtering software or share the password with them â€” that defeats the purpose of parental control. Some programs allow you to filter out specific sites, a group of sites that the software deems inappropriate, or sites with inappropriate keywords in them. However, nothing is foolproof. New sites are created all the time, and these programs may not catch them all. A filter program is not a substitute for supervising your child's online activities.
Know how your child is communicating online
Besides surfing the Web, a good deal of a child's time online may be spent communicating and interacting with others through instant messages, email, social networking sites, chat rooms, and message boards. Keep tabs on who your children are communicating with and the information they're sharing.
Be prepared to handle problems
Even if you take all possible precautions to protect your children when they're online, they may encounter inappropriate material that leaves them scared, uncomfortable, or confused. Be prepared to handle these situations â€” before they arise. If your children tell you about inappropriate web sites or content, don't panic or overreact. It's very important for kids to have a trusted adult to turn to if online problems arise.
Don't forget to create and publish your Resume for better opportunities!