- Community Home
- How To's
- Safety & Security How To’s
- Good cyber habits to protect yourself online
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
- Article History
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
02-14-2025 01:09 PM - edited 09-17-2025 11:22 AM
Cybercriminals are always evolving and finding new ways to deceive you. In many scams, being more aware and diligent is your best defense.
Here are some simple tips you can follow to help protect yourself:
- Use strong passwords: use complex and unique passwords for every account you have. Use a password manager to store and protect them.
- Enable multi factor authentication (MFA): MFA or two-factor authentication (2FA) adds an extra layer of security by requiring a unique one-time passcode in addition to your password when logging in. ❗You should never share your one-time verification code with anyone. It should be used only on a Bell multi-factor authentication (MFA) validation screen (e.g., when logging in or making changes to your MFA details).
- Regularly check your accounts: Log in to your accounts regularly and monitor them for any suspicious activity. Enable account notifications to receive alerts about unusual logins or transactions.
- Be social media smart: Limit personal information shared on social media (email addresses, phone number and dates of birth), and regularly review your security and privacy settings.
- Secure your home Wi-Fi: Create a unique and complex password for your router - never use the default password – and don’t share it with others. For guest access, set up a separate guest network.
- Be cautious on public computers or Wi-Fi: Avoid public Wi-Fi whenever possible. If you must use it, avoid accessing sensitive accounts like banking or email. If you need to access important information, use a VPN. Always clear your browsing history and cache after using a public computer.
- Keep software up to date: Outdated systems are vulnerable to hackers. Keep your operating system and antivirus updated automatically for optimal protection.
- Back up your data: In the event that you are breached, having a backup of your data ensures you do not lose important information, and it makes recovery easier. This is particularly useful if you get a ransomware attack.
In addition to taking basic precautions, here are some extra tips to follow if you receive a suspicious email, text or phone call.
- If an offer seems too good to be true, it probably is.
- If someone is contacting you and they seem suspicious, discontinue the engagement and reach out to the organization at a published number
- Don’t let your emotions cloud your judgement. Scammers often use pressure tactics– excitement, fear, stress, embarrassment – to manipulate you. If you feel pressured, stop the interaction immediately. Legitimate companies will never pressure you into quick decisions.
- Apply the 3S methodology (Scrutinize, Stop, Speak out)
Depending on whether you received an email, text or phone call there are more specific things you should watch out for:
Email (phishing) or texts (smishing):
- If you do not know the sender of an email do not open or respond to it. Look very carefully at the address and the links. Assume it is a phishing attempt until you can validate.
- Never click on links asking you to verify your information – this can likely be done by calling the company.
- Avoid clicking on “sign in” or “register” links in suspicious emails, as fraudsters can gain access to your password
Phone calls (vishing):
- Be wary of unsolicited call and offers.
- Never share PINs or passwords. No company will ask you for a password so this should be a red flag.
- If you are asked for a one-time passcode (2FA), read the email closely to see if says “do not share with anyone”. If so, never give it out.
- Never feel pressured to react immediately. If you feel uncomfortable, hang up and call the company back on the number published on their website or statements you receive.
- Be cautious when receiving calls with a possible fraud label. The Suspicious Call Detection feature from Bell uses AI analytics to monitor incoming calls in real time and alert Mobility customers about potential fraud.
Fraudsters are very creative with their scams and can adapt quickly. You should always trust your instincts – if something doesn’t seem right, exercise caution and if you are not sure ask a family member or friends for advice.
To learn more about fraud and how you can prevent it, we encourage you to read our other articles plus visit Bell.ca/security
for more in depth information.
Social engineering – How cybercriminals focus on people
Emotions - the cornerstone of fraud
Do you suspect fraud? What to do next
New to our forum? These guides will help you find your way around quickly.
- Welcome to the Community!
- Log in/Register
- Community guidelines
- Community help
- Meet the Moderators
- Bell Community All-Stars
- How to send a private message
- Existing customers, login to MyBell to see exclusive offers
- What's on Crave
- What's on Free Preview
- Mobility phone & device catalog
- Latest in the Community
Popular links
-
Activation
1 -
Bell Email
1 -
Email
1 -
Fraud
8 -
Hardware Upgrade
1 -
Internet Security
6 -
Parental Controls
5 -
Password
6 -
phish@bell.ca
1 -
Phishing
14 -
Public safety alert
1 -
Scam
8 -
Security
7 -
Smishing
13 -
Spam
4 -
Trojan
5 -
Vishing
10
- « Previous
- Next »

