Once enabled for your MyShaw account, certain sign-in attempts or account-related changes will trigger a 6-digit verification code sent to you via SMS or email. This code will then grant you access to your account.
Even if someone has your user name and password, they won’t be able to access your account without two-step verification. It’s still important to remain cautious. If they get your account credentials, cybercriminals can send multiple approval requests in a short period of time to irritate the user into giving the attacker access. This is known as MFA Bombing, MFA Fatigue or Push Phishing.
With so much information about you residing in the cloud, passwords are often the only defense between cybercriminals and your online life.
The hacker uses a list of short, common words with number combinations to get through weak and oversimplified passwords.
A program is used to generate passwords and random character sets, starting with commonly used, weak passwords like Password123.
The cybercriminal uses software to monitor network traffic and capture passwords as they’re entered. Similar to tapping a phone line, the software captures your information.
A program monitors information exchanges and inserts itself in the middle of the interaction by impersonating a website or app. This tactic captures the user’s credentials and other sensitive information.
A cybercriminal installs malware that tracks the user’s keystrokes. This allows the gathering of credentials for specific accounts and websites.
With the Internet of Things growing in popularity due to the increase in smart home devices, it is essential to keep your router secure. It controls access to your home Wi-Fi network and is the barrier between cybercriminals and all your connected devices.
Inbound attacks occur if your home network is breached via the Internet through connected devices such as desktop computers, tablets, smart TVs, and game consoles.
Outbound attacks refer to instances when hackers access a home device through the Internet and then use that device to remotely launch malware and obtain sensitive information or attack other networks.
We rely on our devices to stay connected, which makes it critical to take proper measures to protect the personal data we have stored, such as credit card, banking and tax information, medical records, photos and even confidential work information.
It’s easy for laptops, tablets and smartphones to get lost or stolen. And your personal data can even be stolen when connecting to public networks, which requires further awareness on your part. Without strong passwords and network awareness, it is easy for unauthorized users to access your data.
Available to all customers with a Gateway modem, Protected Browsing is an opt-in service that you can use to help safeguard your home network against malicious content. This feature is available at no additional cost, you can enable it on the Home app or on the website by selecting Protected Browsing in the Network section. Visit Shaw Support to learn about activating Protected Browsing.
When enabled, Protected Browsing can reduce the risk of accessing known sources of malware, spyware, and phishing for all devices connected to your home network.
A third-party vendor maintains and updates a list of filtered sites to ensure your digital safety. If a device connected to your home network attempts to access a website known to host malicious content, a block page will be displayed. In the case of secure websites (https) or mobile applications, the block page may not be displayed, but access is still prevented.
Malware is malicious software created to cause damage or disrupt your computer system and potentially provide unauthorized access to your computer, server or network. It can be delivered over email via a link or attached file, instant messaging, internet browsing and social media. As new malware is constantly developed and launched, it’s important to be aware of the kinds of malware that may threaten your information. Some of the most common types of malware are viruses, worms, spyware, Trojans and ransomware.
Ransomware is malicious software that infects your computer and makes your data inaccessible. The attacker will demand a ransom in return for access to your data.
Phishing is when cybercriminals attempt to gain access to your personal information by:
Fraudulent messages and phishing attempts often include false messages related to:
Be wary of emails that:
You can hover your cursor over links in the email to view the URLs they go to, but be careful to not actually click the links if you don't trust them.
Fraudulent email messages are typically sent to obtain personal and private financial information. They ask for confidential information, such as your account username, account number, and password. See our article Identifying Fraudulent Emails "Phishing" for more information about identifying fraudulent emails.
Nobody likes spam, and in some cases it can lead to scams and phishing attempts to steal login credentials or install ransomware. The quickest way to report spam to Shaw is through Webmail, but you can also forward spam to Shaw from a 3rd party email app.
When you use this method to report spam, your email headers will be submitted to Shaw automatically.
If you would prefer to report spam to Shaw through your 3rd party email app:
haw does not accept any form of cryptocurrency for payment and will never ask you to pay using this method. We will also never immediately disconnect a customer’s service without notice. If you receive a suspicious call or text of this nature claiming to be from Shaw, contact us directly at 1-800-472-2222 or chat with us live on Shaw.ca.