Fighting Fraud & Scams

SUNRATE has an unprecedented opportunity to promote sustained growth in our markets worldwide. However, it also means that we have a significant part to play in combating fraud and scams.

Phishing scam Impersonation scam Malware Attack Compromised Device

Phishing scam

Phishing is a social engineering technique used by cyber criminals to fraudulently obtain sensitive information by impersonating a legitimate individual or reputable organisation in digital communication. Phishing can come in the form of emails, messages and websites.

Impersonation scam

Impersonation is a fraudulent technique used by cyber criminals, pretending to be from a trusted organisation. Once they have gained your trust, they trick you into revealing your personal information and/or sending them money.

Malware Attack

Malware is an intrusive software developed by cyber criminals to steal data and damage computers, networks, and servers.

Compromised Device

A compromised or hacked device is where cyber criminals have unauthorised access to your device(s), such as your phone or computer. More often than not, taking action on your part, such as downloading a malicious app, clicking on a malicious link, or using an unsecured public Wi-Fi are some of the several ways cyber criminals install dangerous malware and gaining access to your device(s).

 

We hope to use cookies to better understand your use of this website. This will help improve your future experience of accessing this website. For detailed information on the use of cookies and how to revoke or manage your consent, please refer to our < privacy policy >. If you click the confirmation button on the right, you will be deemed to have agreed to use cookies.